An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating r...An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating redundant design in work position substituting are presented. At last, the pivotal questions solved are discussed. With an advanced structure, this system is multi functional and flexible. Furthermore, advanced computer technology is adopted to improve its technical degree.展开更多
In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management ap...In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management applications are developed using the development technology of Visual Basic language and computer system operating environment, to achieve a network management software for users on food additives of quality analytical testing. The software sets up an information sharing network platform for enterprise and quality management departments, which is a major innovation in the food additive quality analysis on test management methods and tools.展开更多
This paper studies the technics of reducing item exposure by utilizing automatic item generation methods. Known test item calibration method uses item parameter estimation with the statistical data, collected during e...This paper studies the technics of reducing item exposure by utilizing automatic item generation methods. Known test item calibration method uses item parameter estimation with the statistical data, collected during examinees prior testing. Disadvantage of the mentioned item calibration method is the item exposure; when test items become familiar to the examinees. To reduce the item exposure, automatic item generation method is used, where item models are being constructed based on already calibrated test items without losing already estimated item parameters. A technic of item model extraction method from the already calibrated and therefore exposed test items described, which can be used by the test item development specialists to integrate automatic item generation principles with the existing testing applications.展开更多
The randomness and complexity of urban traffic scenes make it a difficult task for self-driving cars to detect drivable areas, Inspired by human driving behaviors, we propose a novel method of drivable area detection ...The randomness and complexity of urban traffic scenes make it a difficult task for self-driving cars to detect drivable areas, Inspired by human driving behaviors, we propose a novel method of drivable area detection for self-driving cars based on fusing pixel information from a monocular camera with spatial information from a light detection and ranging (LIDAR) scanner, Similar to the bijection of collineation, a new concept called co-point mapping, which is a bijection that maps points from the LIDAR scanner to points on the edge of the image segmentation, is introduced in the proposed method, Our method posi- tions candidate drivable areas through self-learning models based on the initial drivable areas that are obtained by fusing obstacle information with superpixels, In addition, a fusion of four features is applied in order to achieve a more robust performance, In particular, a feature called drivable degree (DD) is pro- posed to characterize the drivable degree of the LIDAR points, After the initial drivable area is characterized by the features obtained through self-learning, a Bayesian framework is utilized to calculate the final probability map of the drivable area, Our approach introduces no common hypothesis and requires no training steps; yet it yields a state-of-art performance when tested on the ROAD-KITTI benchmark, Experimental results demonstrate that the proposed method is a general and efficient approach for detecting drivable area,展开更多
While vehicle detection on highways has been reported before, to the best of our knowledge, intelligent monitoring system that aims at detecting hydraulic excavators and dump trucks on state-owned land has not been ex...While vehicle detection on highways has been reported before, to the best of our knowledge, intelligent monitoring system that aims at detecting hydraulic excavators and dump trucks on state-owned land has not been explored thoroughly yet. In this paper, we present an automatic, video-based algorithm for detecting hydraulic excavators and dump trucks. Derived from lessons learned from video processing, we proposed methods for foreground detection based on an improved frame difference algorithm, and then detected hydraulic excavators and dump trucks in the respective region of interest. From our analysis, we proposed methods based on inverse valley feature of mechanical arm and spatial-temporal reasoning for hydraulic excavator detection. In addition, we explored dump truck detection strategies that combine structured component projection with the spatial relationship. Experiments on real-monitoring sites demonstrated the promising performance of our system.展开更多
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra...Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.展开更多
The method and instrument for permittivity measurements of high-loss substances as biological objects are presented.The results of improving the measuring cuvette by means of computer simulation and optimization of me...The method and instrument for permittivity measurements of high-loss substances as biological objects are presented.The results of improving the measuring cuvette by means of computer simulation and optimization of measurement system are described.The optimization carried out allows the application of the dielectrometer in the diagnostic test under development.展开更多
Strata movement simulation was conducted in an equivalent material modeling facility developed by the Department of Mining Engineering, Southern Illinois University at Carbondale, under U. S. Bureau of Mines contracts...Strata movement simulation was conducted in an equivalent material modeling facility developed by the Department of Mining Engineering, Southern Illinois University at Carbondale, under U. S. Bureau of Mines contracts. An innovative displacement measurement system called videogrammetric system was developed and utilized for recording, measuring and analyzing the deformation and failure process of the models. A room and pillar mining and a longwall mining prototypes were studied in the modeling. Study found that weak floor of coal seam plays an important role in pillar stability and therefore the overburden movements.展开更多
The ESS software package is prepared for electrical data processing in the fields of coal prospecting, hydrogeologicai engineering, and can be used in the other fields of electrical data processing. It can be operated...The ESS software package is prepared for electrical data processing in the fields of coal prospecting, hydrogeologicai engineering, and can be used in the other fields of electrical data processing. It can be operated on any kind of microcomputer which has an internal memories of more than 512kB.The ESS software package would be leading the office operation to an automatic data processing period and the field work free from the tedious, repeated data treating and mapping, so that the engineers would have more time to analyse and interpret field data. Undoubtedly, it is of benefit to improving the relibility of the geological evaluation.展开更多
Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated th...Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated them self to a first-class security threat to Metropolitan Area Networks (MAN). Multi-agent system for Worm Detection and Containment in MAN (MWDCM) is presented to provide a first-class automatic reaction mechanism that automatically applies containment strategies to block the propagation of the worms and to protect MAN against worm scan that wastes a lot of network bandwidth and crashes the routers. Its user agent is used to detect the known worms. Worm detection agent and worm detection correlation agent use two-stage based decision method to detect unknown worms. They adaptively study the accessing in the whole network and dynamically change the working parameters to detect the unknown worms. MWDCM confines worm infection within a macro-cell or a micro-cell of the metropolitan area networks, the rest of the accesses and hosts continue functioning without disruption. MWDCM integrates Worm Detection System (WDS) and network management system. Reaction measures can be taken by using Simple Network Management Protocol (SNMP) interface to control broadband access server as soon as the WDS detect the active worm. MWDCM is very effective in blocking random scanning worms. Simulation results indicate that high worm infection rate of epidemics can be avoided to a degree by MWDCM blocking the propagation of the worms.展开更多
Numerous edge-chasing deadlock detection algonthms were developed lor the cycle detection in distributed systems, but their detections had the n steps speed limitation and n ( n- 1) overhead limitation to detect a c...Numerous edge-chasing deadlock detection algonthms were developed lor the cycle detection in distributed systems, but their detections had the n steps speed limitation and n ( n- 1) overhead limitation to detect a cycle of size n under the one-resource request model. Since fast deadlock detection is critical, this paper proposed a new algorithm to speed up the detection process. In our algorithm, when the running of a transaction node is blocked, the being requested resource nodes reply it with the waiting or being waited message simultaneously, so the blocked node knows both its predecessors and successors, which helps it detecting a cycle of size 2 directly and locally. For the cycle of size n ( n 〉 2), a special probe is produced which has the predecessors information of its originator, so the being detected nodes know their indirect predecessors and direct successors, and can detect the cycle within n - 2 steps. The proposed algorithm is formally proved to be correct by the invariant verification method. Performance evaluation shows that the message overhead of our detection is ( n^2 - n - 2)/2, hence both the detection speed and message cost of the proposed algorithm are better than that of the existing al gorithms.展开更多
Three progressive stages of testing techniques are elaborated,which are en-tirely manual operating,taking separate instruments testing and computer program con-trolling.The testing method and principle are detailed ba...Three progressive stages of testing techniques are elaborated,which are en-tirely manual operating,taking separate instruments testing and computer program con-trolling.The testing method and principle are detailed based on the testing process formeteorological parameters,air pressure,air quality and rotating velocity.And every testingtechnique is analyzed.Finally, the technique outlook is viewed.All this plays a leading rolein development of the testing techniques.展开更多
By system analysis and imitating modeling authors show the most effective modern techniques for railway electric systems control. Modem measure technologies PMU-WAMS and smart grid allow to solve real time tasks of ce...By system analysis and imitating modeling authors show the most effective modern techniques for railway electric systems control. Modem measure technologies PMU-WAMS and smart grid allow to solve real time tasks of centralizing control of railway electric systems. Quantity characteristics of control effectiveness are determined. According to computer modeling the situation approach is available for practical tasks of railway electric system control.展开更多
The objective of this work is to formulate and demonstrate the methodology of multi-models for improving the performance of existing advanced control strategies. Multiple models are used to capture the nonlinear proce...The objective of this work is to formulate and demonstrate the methodology of multi-models for improving the performance of existing advanced control strategies. Multiple models are used to capture the nonlinear process dynamics relating to gain and time constant variations. The multi-model strategy was implemented on several controllers such as Smith-Predictor using PI (Proportional-lntegral) and GPC (Generalized Predictive Control). Computer simulations and experiments were conducted on several nonlinear systems and compared to the original form of these controllers. The enhanced approach was tested on controlling the screw speed of an injection molding machine and temperature of a steel cylinder.展开更多
The purpose of this paper is to solve the problem of determining the limits of multivariate rational functions.It is essential to decide whether or not limxˉ→0f g=0 for two non-zero polynomials f,g∈R[x1,...,xn]with...The purpose of this paper is to solve the problem of determining the limits of multivariate rational functions.It is essential to decide whether or not limxˉ→0f g=0 for two non-zero polynomials f,g∈R[x1,...,xn]with f(0,...,0)=g(0,...,0)=0.For two such polynomials f and g,we establish two necessary and sufcient conditions for the rational functionf g to have its limit 0 at the origin.Based on these theoretic results,we present an algorithm for deciding whether or not lim(x1,...,xn)→(0,...,0)f g=0,where f,g∈R[x1,...,xn]are two non-zero polynomials.The design of our algorithm involves two existing algorithms:one for computing the rational univariate representations of a complete chain of polynomials,another for catching strictly critical points in a real algebraic variety.The two algorithms are based on the well-known Wu’s method.With the aid of the computer algebraic system Maple,our algorithm has been made into a general program.In the final section of this paper,several examples are given to illustrate the efectiveness of our algorithm.展开更多
文摘An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating redundant design in work position substituting are presented. At last, the pivotal questions solved are discussed. With an advanced structure, this system is multi functional and flexible. Furthermore, advanced computer technology is adopted to improve its technical degree.
文摘In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management applications are developed using the development technology of Visual Basic language and computer system operating environment, to achieve a network management software for users on food additives of quality analytical testing. The software sets up an information sharing network platform for enterprise and quality management departments, which is a major innovation in the food additive quality analysis on test management methods and tools.
文摘This paper studies the technics of reducing item exposure by utilizing automatic item generation methods. Known test item calibration method uses item parameter estimation with the statistical data, collected during examinees prior testing. Disadvantage of the mentioned item calibration method is the item exposure; when test items become familiar to the examinees. To reduce the item exposure, automatic item generation method is used, where item models are being constructed based on already calibrated test items without losing already estimated item parameters. A technic of item model extraction method from the already calibrated and therefore exposed test items described, which can be used by the test item development specialists to integrate automatic item generation principles with the existing testing applications.
基金This research was partially supported by the National Natural Science Foundation of China (61773312), the National Key Research and Development Plan (2017YFC0803905), and the Program of Introducing Talents of Discipline to University (B13043).
文摘The randomness and complexity of urban traffic scenes make it a difficult task for self-driving cars to detect drivable areas, Inspired by human driving behaviors, we propose a novel method of drivable area detection for self-driving cars based on fusing pixel information from a monocular camera with spatial information from a light detection and ranging (LIDAR) scanner, Similar to the bijection of collineation, a new concept called co-point mapping, which is a bijection that maps points from the LIDAR scanner to points on the edge of the image segmentation, is introduced in the proposed method, Our method posi- tions candidate drivable areas through self-learning models based on the initial drivable areas that are obtained by fusing obstacle information with superpixels, In addition, a fusion of four features is applied in order to achieve a more robust performance, In particular, a feature called drivable degree (DD) is pro- posed to characterize the drivable degree of the LIDAR points, After the initial drivable area is characterized by the features obtained through self-learning, a Bayesian framework is utilized to calculate the final probability map of the drivable area, Our approach introduces no common hypothesis and requires no training steps; yet it yields a state-of-art performance when tested on the ROAD-KITTI benchmark, Experimental results demonstrate that the proposed method is a general and efficient approach for detecting drivable area,
文摘While vehicle detection on highways has been reported before, to the best of our knowledge, intelligent monitoring system that aims at detecting hydraulic excavators and dump trucks on state-owned land has not been explored thoroughly yet. In this paper, we present an automatic, video-based algorithm for detecting hydraulic excavators and dump trucks. Derived from lessons learned from video processing, we proposed methods for foreground detection based on an improved frame difference algorithm, and then detected hydraulic excavators and dump trucks in the respective region of interest. From our analysis, we proposed methods based on inverse valley feature of mechanical arm and spatial-temporal reasoning for hydraulic excavator detection. In addition, we explored dump truck detection strategies that combine structured component projection with the spatial relationship. Experiments on real-monitoring sites demonstrated the promising performance of our system.
基金Supported by the High Technology Research and Development Programme of China (No. 2003AA1Z2070 ) and the National Natural Science Foundation of China (No. 90412013).
文摘Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.
文摘The method and instrument for permittivity measurements of high-loss substances as biological objects are presented.The results of improving the measuring cuvette by means of computer simulation and optimization of measurement system are described.The optimization carried out allows the application of the dielectrometer in the diagnostic test under development.
文摘Strata movement simulation was conducted in an equivalent material modeling facility developed by the Department of Mining Engineering, Southern Illinois University at Carbondale, under U. S. Bureau of Mines contracts. An innovative displacement measurement system called videogrammetric system was developed and utilized for recording, measuring and analyzing the deformation and failure process of the models. A room and pillar mining and a longwall mining prototypes were studied in the modeling. Study found that weak floor of coal seam plays an important role in pillar stability and therefore the overburden movements.
文摘The ESS software package is prepared for electrical data processing in the fields of coal prospecting, hydrogeologicai engineering, and can be used in the other fields of electrical data processing. It can be operated on any kind of microcomputer which has an internal memories of more than 512kB.The ESS software package would be leading the office operation to an automatic data processing period and the field work free from the tedious, repeated data treating and mapping, so that the engineers would have more time to analyse and interpret field data. Undoubtedly, it is of benefit to improving the relibility of the geological evaluation.
基金Partially supported by the Teaching and Research Award for Outstanding Young Teachers in High Education Institutions of MOE, China (No.200065).
文摘Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated them self to a first-class security threat to Metropolitan Area Networks (MAN). Multi-agent system for Worm Detection and Containment in MAN (MWDCM) is presented to provide a first-class automatic reaction mechanism that automatically applies containment strategies to block the propagation of the worms and to protect MAN against worm scan that wastes a lot of network bandwidth and crashes the routers. Its user agent is used to detect the known worms. Worm detection agent and worm detection correlation agent use two-stage based decision method to detect unknown worms. They adaptively study the accessing in the whole network and dynamically change the working parameters to detect the unknown worms. MWDCM confines worm infection within a macro-cell or a micro-cell of the metropolitan area networks, the rest of the accesses and hosts continue functioning without disruption. MWDCM integrates Worm Detection System (WDS) and network management system. Reaction measures can be taken by using Simple Network Management Protocol (SNMP) interface to control broadband access server as soon as the WDS detect the active worm. MWDCM is very effective in blocking random scanning worms. Simulation results indicate that high worm infection rate of epidemics can be avoided to a degree by MWDCM blocking the propagation of the worms.
文摘Numerous edge-chasing deadlock detection algonthms were developed lor the cycle detection in distributed systems, but their detections had the n steps speed limitation and n ( n- 1) overhead limitation to detect a cycle of size n under the one-resource request model. Since fast deadlock detection is critical, this paper proposed a new algorithm to speed up the detection process. In our algorithm, when the running of a transaction node is blocked, the being requested resource nodes reply it with the waiting or being waited message simultaneously, so the blocked node knows both its predecessors and successors, which helps it detecting a cycle of size 2 directly and locally. For the cycle of size n ( n 〉 2), a special probe is produced which has the predecessors information of its originator, so the being detected nodes know their indirect predecessors and direct successors, and can detect the cycle within n - 2 steps. The proposed algorithm is formally proved to be correct by the invariant verification method. Performance evaluation shows that the message overhead of our detection is ( n^2 - n - 2)/2, hence both the detection speed and message cost of the proposed algorithm are better than that of the existing al gorithms.
文摘Three progressive stages of testing techniques are elaborated,which are en-tirely manual operating,taking separate instruments testing and computer program con-trolling.The testing method and principle are detailed based on the testing process formeteorological parameters,air pressure,air quality and rotating velocity.And every testingtechnique is analyzed.Finally, the technique outlook is viewed.All this plays a leading rolein development of the testing techniques.
文摘By system analysis and imitating modeling authors show the most effective modern techniques for railway electric systems control. Modem measure technologies PMU-WAMS and smart grid allow to solve real time tasks of centralizing control of railway electric systems. Quantity characteristics of control effectiveness are determined. According to computer modeling the situation approach is available for practical tasks of railway electric system control.
文摘The objective of this work is to formulate and demonstrate the methodology of multi-models for improving the performance of existing advanced control strategies. Multiple models are used to capture the nonlinear process dynamics relating to gain and time constant variations. The multi-model strategy was implemented on several controllers such as Smith-Predictor using PI (Proportional-lntegral) and GPC (Generalized Predictive Control). Computer simulations and experiments were conducted on several nonlinear systems and compared to the original form of these controllers. The enhanced approach was tested on controlling the screw speed of an injection molding machine and temperature of a steel cylinder.
基金supported by National Natural Science Foundation of China(Grant No.11161034)the Science Foundation of the Eduction Department of Jiangxi Province(Grant No.Gjj12012)
文摘The purpose of this paper is to solve the problem of determining the limits of multivariate rational functions.It is essential to decide whether or not limxˉ→0f g=0 for two non-zero polynomials f,g∈R[x1,...,xn]with f(0,...,0)=g(0,...,0)=0.For two such polynomials f and g,we establish two necessary and sufcient conditions for the rational functionf g to have its limit 0 at the origin.Based on these theoretic results,we present an algorithm for deciding whether or not lim(x1,...,xn)→(0,...,0)f g=0,where f,g∈R[x1,...,xn]are two non-zero polynomials.The design of our algorithm involves two existing algorithms:one for computing the rational univariate representations of a complete chain of polynomials,another for catching strictly critical points in a real algebraic variety.The two algorithms are based on the well-known Wu’s method.With the aid of the computer algebraic system Maple,our algorithm has been made into a general program.In the final section of this paper,several examples are given to illustrate the efectiveness of our algorithm.