In order to overcome the flaws of present domestic devices for detecting faulty wires such as low precision,low sensitivity and instability,a new instrument for detecting and processing the signal of flux leakage caus...In order to overcome the flaws of present domestic devices for detecting faulty wires such as low precision,low sensitivity and instability,a new instrument for detecting and processing the signal of flux leakage caused by bro-ken wires of coal mine-hoist cables is investigated. The principle of strong magnetic detection was adopted in the equipment. Wires were magnetized by a pre-magnetic head to reach magnetization saturation. Our special feature is that the number of flux-gates installed along the circle direction on the wall of sensors is twice as large as the number of strands in the wire cable. Neighboring components are connected in series and the interference on the surface of the wire cable,produced by leakage from the flux field of the wire strands,is efficiently filtered. The sampled signal se-quence produced by broken wires,which is characterized by a three-dimensional distribution of the flux-leakage field on the surface of the wire cable,can be dimensionally condensed and characteristically extracted. A model of a BP neu-ral network is built and the algorithm of the BP neural network is then used to identify the number of broken wires quantitatively. In our research,we used a 6×37+FC,Φ24 mm wire cable as our test object. Randomly several wires were artificially broken and damaged to different degrees. The experiments were carried out 100 times to obtain data for 100 groups from our samples. The data were then entered into the BP neural network and trained. The network was then used to identify a total 16 wires,broken at five different locations. The test data proves that our new device can enhance the precision in detecting broken and damaged wires.展开更多
To meet the increasing demand of wireless broadband applications in future 5G cellular networks, Device-to-Device(D2D) communications serve as a candidate paradigm to improve spectrum efficiency. Considering the chall...To meet the increasing demand of wireless broadband applications in future 5G cellular networks, Device-to-Device(D2D) communications serve as a candidate paradigm to improve spectrum efficiency. Considering the challenges after D2 D transmission is introduced for future cellular networks, this paper deals with mode selection and resource allocation issues related with D2 D communications. First, we propose a mode selection scheme which aims at guaranteeing the transmission of cellular users and also considering the potential interference. We analyze the condition under which D2 D underlay mode should be used. Second, we answer the question of "how to effectively reuse cellular resource once underlaying mode is adopted". We further present a resource allocation scheme that focuses on minimizing overall interference as well as a power control method to improve the performance of D2 D systems. Simulation results demonstrate that system parameters greatly affect the switching condition of mode selection and probability of choosing underlay mode. Furthermore, for D2 D underlaying scenario, the proposed resource allocation algorithm guarantees the transmission of cellular users with consideration of transmission requirements of D2 D users. Hence, the proposed scheme can achieve better user experience.展开更多
The installation of vast quantities of additional new sensing and communication equipment, in conjunction with building the computing infrastructure to store and manage data gathered by this equipment, has been the fi...The installation of vast quantities of additional new sensing and communication equipment, in conjunction with building the computing infrastructure to store and manage data gathered by this equipment, has been the fi rst step in the creation of what is generically referred to as the "smart grid" for the electric transmission system. With this enormous capital investment in equipment having been made, attention is now focused on developing methods to analyze and visualize this large data set. The most direct use of this large set of new data will be in data visualization. This paper presents a survey of some visualization techniques that have been deployed by the electric power industry for visualizing data over the past several years. These techniques include pie charts, animation, contouring, time-varying graphs, geographic-based displays, image blending, and data aggregation techniques. The paper then emphasizes a newer concept of using word-sized graphics called sparklines as an extremely eff ective method of showing large amounts of timevarying data.展开更多
It has been shown that the deployment of device-to-device(D2D) communication in cellular systems can provide better support for local services. However, improper design of the hybrid system may cause severe interferen...It has been shown that the deployment of device-to-device(D2D) communication in cellular systems can provide better support for local services. However, improper design of the hybrid system may cause severe interference between cellular and D2D links. In this paper, we consider transceiver design for the system employing multiple antennas to mitigate the interference. The precoder and decoder matrices are optimized in terms of sum mean squared error(MSE) and capacity, respectively. For the MSE minimization problem, we present an alternative transceiver optimization algorithm. While for the non-convex capacity maximization problem, we decompose the primal problem into a sequence of standard convex quadratic programs for efficient optimization. The evaluation of our proposed algorithms for performance enhancement of the entire D2D integrated cellular system is carried out through simulations.展开更多
Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of research...Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of researchers from diverse fields such as physics, mathematics, and computer science. We review the background and current state of quantum communications technology, with an emphasis on quantum key distribution, quantum random number generation, and a relatively hot topic: device independent protocols.展开更多
This paper introduces the preparatory work and conducts an integrated review on the maiden voyage of a Chinese commercial ship on the Arctic Northeast Route. It puts forth expectations on the exploitation and utilizat...This paper introduces the preparatory work and conducts an integrated review on the maiden voyage of a Chinese commercial ship on the Arctic Northeast Route. It puts forth expectations on the exploitation and utilization of the Arctic Northeast Route in the aspects of safety, fastness, low costs, low consumption of energy and less pollution, knowledge of maritime law and navigation practice, building seaworthiness ships and making studies on the methods of sailing and maneuvering for navigation in polar waters, training qualified seafarers with navigation experiences in ice waters and establishing a safeguard system for the navigation in this route through the analysis on the weather, temperature, ice condition, route and hydrology encountered in the practice of a Chinese merchant ship in its maiden voyage in the route, and studies on the ice pilotage, convoy by icebreaker, practical condition of communication and navigation equipment in sea areas of high latitude and the economic benefit of the navigation in the Arctic Northeast Route.展开更多
A new tamping device which is driven by an electrohydraulic exciter was proposed to overcome the limitations of mechanically driven devices.The double-rod oscillation cylinder drives the tamping arm to realize vibrati...A new tamping device which is driven by an electrohydraulic exciter was proposed to overcome the limitations of mechanically driven devices.The double-rod oscillation cylinder drives the tamping arm to realize vibration.A new spin valve was designed in order to fulfill dynamic state requirements of the oscillation cylinder.Parametric analysis was carried out by establishing mathematic model.Then,the relationships among the structure of valve port and the frequency,amplitude,output shock force of the cylinder were researched.An experimental device of the electrohydraulic exciter was established to validate the theoretical results.The signals were acquired by AVANT dynamic signal analyser of vibration.The results show that new tamping device can satisfy all kinds of complex working conditions with the flexible adjustment of frequency and amplitude.展开更多
The electronic system in a comprehensive shipboard has a extremely wide bandwidth. It supports synchronized and asynchronous data transmission, muhimedia correspondence, and videophone conferencing. In order to guaran...The electronic system in a comprehensive shipboard has a extremely wide bandwidth. It supports synchronized and asynchronous data transmission, muhimedia correspondence, and videophone conferencing. In order to guarantee the security and correspondent real time of the communication, choosing a multicast routing protocol based on different applications is a key problem in terms of the complexity of the system. A simulation model was first designed for existing multicast routing protocols in NS-2 and analysis was performed on their corresponding application environments. The experiments proved that PIM-DM based on the shortest-path tree protocol is suitable for communication in the field of comprehensive shipboard. Further work that is necessary is also discussed.展开更多
According to the current working status of underground safety management and production scheduling, the importance and existed problem of underground mine radio communication were summarized, and the basic principle a...According to the current working status of underground safety management and production scheduling, the importance and existed problem of underground mine radio communication were summarized, and the basic principle and classification of leaky feeder cable were introduced and the characteristics of cable were analyzed specifically in depth, and the application model of radio communication system for underground mine safety management was put forward. Meanwhile, the research explanation of the system component, function and evaluation was provided. The discussion result indicates that communication system of underground mine safety management which is integrated two-way relay amplifier and other equipment has many communication functions, and underground mine mobile communication can be achieved well.展开更多
A novel text independent speaker identification system is proposed. In the proposed system, the 12-order perceptual linear predictive cepstrum and their delta coefficients in the span of five frames are extracted from...A novel text independent speaker identification system is proposed. In the proposed system, the 12-order perceptual linear predictive cepstrum and their delta coefficients in the span of five frames are extracted from the segmented speech based on the method of pitch synchronous analysis. The Fisher ratios of the original coefficients then be calculated, and the coefficients whose Fisher ratios are bigger are selected to form the 13-dimensional feature vectors of speaker. The Gaussian mixture model is used to model the speakers. The experimental results show that the identification accuracy of the proposed system is obviously better than that of the systems based on other conventional coefficients like the linear predictive cepstral coefficients and the Mel-frequency cepstral coefficients.展开更多
The transmission capacity of Mobile Ad Hoc Networking (MANET) is constrained by the mutual interference of concurrent transmissions between nodes. First, the transmission capacity of MANET is studied by the view of in...The transmission capacity of Mobile Ad Hoc Networking (MANET) is constrained by the mutual interference of concurrent transmissions between nodes. First, the transmission capacity of MANET is studied by the view of information flow between nodes. At the same time, the problem that the interference between nodes affects the transmission capacity of MANET is also studied by the tool of the event conflict graph. Secondly, the paper presents the method to compute the maximum ex- pectant achievable capacity for the given conflict graph, and concludes and proves an sufficient con- dition that the information flow transmit successfully between nodes. At last, the results are simulated and a fitting equation of transmission capacity between nodes is given.展开更多
文摘In order to overcome the flaws of present domestic devices for detecting faulty wires such as low precision,low sensitivity and instability,a new instrument for detecting and processing the signal of flux leakage caused by bro-ken wires of coal mine-hoist cables is investigated. The principle of strong magnetic detection was adopted in the equipment. Wires were magnetized by a pre-magnetic head to reach magnetization saturation. Our special feature is that the number of flux-gates installed along the circle direction on the wall of sensors is twice as large as the number of strands in the wire cable. Neighboring components are connected in series and the interference on the surface of the wire cable,produced by leakage from the flux field of the wire strands,is efficiently filtered. The sampled signal se-quence produced by broken wires,which is characterized by a three-dimensional distribution of the flux-leakage field on the surface of the wire cable,can be dimensionally condensed and characteristically extracted. A model of a BP neu-ral network is built and the algorithm of the BP neural network is then used to identify the number of broken wires quantitatively. In our research,we used a 6×37+FC,Φ24 mm wire cable as our test object. Randomly several wires were artificially broken and damaged to different degrees. The experiments were carried out 100 times to obtain data for 100 groups from our samples. The data were then entered into the BP neural network and trained. The network was then used to identify a total 16 wires,broken at five different locations. The test data proves that our new device can enhance the precision in detecting broken and damaged wires.
基金supported by the National Natural Science Foundation of China(No.61501371)National 863 High Tech R&D Program of China(project number:2014AA01A703)+1 种基金National Science and Technology Major Project of the Ministry of Science and Technology of China(project number:2014ZX03001025-006)The international Exchange and Cooperation Projects of Shaanxi Province(project number:2016KW-046)
文摘To meet the increasing demand of wireless broadband applications in future 5G cellular networks, Device-to-Device(D2D) communications serve as a candidate paradigm to improve spectrum efficiency. Considering the challenges after D2 D transmission is introduced for future cellular networks, this paper deals with mode selection and resource allocation issues related with D2 D communications. First, we propose a mode selection scheme which aims at guaranteeing the transmission of cellular users and also considering the potential interference. We analyze the condition under which D2 D underlay mode should be used. Second, we answer the question of "how to effectively reuse cellular resource once underlaying mode is adopted". We further present a resource allocation scheme that focuses on minimizing overall interference as well as a power control method to improve the performance of D2 D systems. Simulation results demonstrate that system parameters greatly affect the switching condition of mode selection and probability of choosing underlay mode. Furthermore, for D2 D underlaying scenario, the proposed resource allocation algorithm guarantees the transmission of cellular users with consideration of transmission requirements of D2 D users. Hence, the proposed scheme can achieve better user experience.
基金the Power Systems Engineering Research Foundation (PSERC)the US National Science Foundation (1128325)
文摘The installation of vast quantities of additional new sensing and communication equipment, in conjunction with building the computing infrastructure to store and manage data gathered by this equipment, has been the fi rst step in the creation of what is generically referred to as the "smart grid" for the electric transmission system. With this enormous capital investment in equipment having been made, attention is now focused on developing methods to analyze and visualize this large data set. The most direct use of this large set of new data will be in data visualization. This paper presents a survey of some visualization techniques that have been deployed by the electric power industry for visualizing data over the past several years. These techniques include pie charts, animation, contouring, time-varying graphs, geographic-based displays, image blending, and data aggregation techniques. The paper then emphasizes a newer concept of using word-sized graphics called sparklines as an extremely eff ective method of showing large amounts of timevarying data.
基金supportedin part by Science and Technology Project of State Grid Corporation of China(SGIT0000KJJS1500008)Science and Technology Project of State Grid Corporation of China:“Research and Application of Distributed Energy Resource Public Information Service Platform based on Multisource Data Fusion and Mobile Internet Technologies”Science and Technology Project of State Grid Corporation of China:“Research on communication access technology for the integration, protection, and acquisition of multiple new energy resources”
文摘It has been shown that the deployment of device-to-device(D2D) communication in cellular systems can provide better support for local services. However, improper design of the hybrid system may cause severe interference between cellular and D2D links. In this paper, we consider transceiver design for the system employing multiple antennas to mitigate the interference. The precoder and decoder matrices are optimized in terms of sum mean squared error(MSE) and capacity, respectively. For the MSE minimization problem, we present an alternative transceiver optimization algorithm. While for the non-convex capacity maximization problem, we decompose the primal problem into a sequence of standard convex quadratic programs for efficient optimization. The evaluation of our proposed algorithms for performance enhancement of the entire D2D integrated cellular system is carried out through simulations.
基金supported by the National Basic Research Program of China under Grants No. 2011CBA00200 No. 2011CB921200+2 种基金National Natural Science Foundation of China under Grants No. 60921091 No. 61101137 No. 61201239
文摘Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of researchers from diverse fields such as physics, mathematics, and computer science. We review the background and current state of quantum communications technology, with an emphasis on quantum key distribution, quantum random number generation, and a relatively hot topic: device independent protocols.
文摘This paper introduces the preparatory work and conducts an integrated review on the maiden voyage of a Chinese commercial ship on the Arctic Northeast Route. It puts forth expectations on the exploitation and utilization of the Arctic Northeast Route in the aspects of safety, fastness, low costs, low consumption of energy and less pollution, knowledge of maritime law and navigation practice, building seaworthiness ships and making studies on the methods of sailing and maneuvering for navigation in polar waters, training qualified seafarers with navigation experiences in ice waters and establishing a safeguard system for the navigation in this route through the analysis on the weather, temperature, ice condition, route and hydrology encountered in the practice of a Chinese merchant ship in its maiden voyage in the route, and studies on the ice pilotage, convoy by icebreaker, practical condition of communication and navigation equipment in sea areas of high latitude and the economic benefit of the navigation in the Arctic Northeast Route.
基金Projects(50975252,51275499)supported by the National Natural Science Foundation of ChinaProject(2013CB035404)supported by the National Basic Research Program of ChinaProject(GZKF-201312)supported by Open Foundation of the State Key Laboratory of Fluid Power Transmission and Control,China
文摘A new tamping device which is driven by an electrohydraulic exciter was proposed to overcome the limitations of mechanically driven devices.The double-rod oscillation cylinder drives the tamping arm to realize vibration.A new spin valve was designed in order to fulfill dynamic state requirements of the oscillation cylinder.Parametric analysis was carried out by establishing mathematic model.Then,the relationships among the structure of valve port and the frequency,amplitude,output shock force of the cylinder were researched.An experimental device of the electrohydraulic exciter was established to validate the theoretical results.The signals were acquired by AVANT dynamic signal analyser of vibration.The results show that new tamping device can satisfy all kinds of complex working conditions with the flexible adjustment of frequency and amplitude.
基金Supported by the Performance Simulation and Computation Complexity on Computer Network Foundation (No.F2004060)
文摘The electronic system in a comprehensive shipboard has a extremely wide bandwidth. It supports synchronized and asynchronous data transmission, muhimedia correspondence, and videophone conferencing. In order to guarantee the security and correspondent real time of the communication, choosing a multicast routing protocol based on different applications is a key problem in terms of the complexity of the system. A simulation model was first designed for existing multicast routing protocols in NS-2 and analysis was performed on their corresponding application environments. The experiments proved that PIM-DM based on the shortest-path tree protocol is suitable for communication in the field of comprehensive shipboard. Further work that is necessary is also discussed.
文摘According to the current working status of underground safety management and production scheduling, the importance and existed problem of underground mine radio communication were summarized, and the basic principle and classification of leaky feeder cable were introduced and the characteristics of cable were analyzed specifically in depth, and the application model of radio communication system for underground mine safety management was put forward. Meanwhile, the research explanation of the system component, function and evaluation was provided. The discussion result indicates that communication system of underground mine safety management which is integrated two-way relay amplifier and other equipment has many communication functions, and underground mine mobile communication can be achieved well.
文摘A novel text independent speaker identification system is proposed. In the proposed system, the 12-order perceptual linear predictive cepstrum and their delta coefficients in the span of five frames are extracted from the segmented speech based on the method of pitch synchronous analysis. The Fisher ratios of the original coefficients then be calculated, and the coefficients whose Fisher ratios are bigger are selected to form the 13-dimensional feature vectors of speaker. The Gaussian mixture model is used to model the speakers. The experimental results show that the identification accuracy of the proposed system is obviously better than that of the systems based on other conventional coefficients like the linear predictive cepstral coefficients and the Mel-frequency cepstral coefficients.
文摘The transmission capacity of Mobile Ad Hoc Networking (MANET) is constrained by the mutual interference of concurrent transmissions between nodes. First, the transmission capacity of MANET is studied by the view of information flow between nodes. At the same time, the problem that the interference between nodes affects the transmission capacity of MANET is also studied by the tool of the event conflict graph. Secondly, the paper presents the method to compute the maximum ex- pectant achievable capacity for the given conflict graph, and concludes and proves an sufficient con- dition that the information flow transmit successfully between nodes. At last, the results are simulated and a fitting equation of transmission capacity between nodes is given.