期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
平衡房间型量热计分层式控制测量系统 被引量:1
1
作者 宋坚华 李雄 《电机电器技术》 1991年第2期18-21,共4页
介绍用于空调器测量的平衡房间型量热计原理,分层式控测系统的结构、控制回路结构、控制算法及软件等。
关键词 空调器 量热计 计算机测系统
下载PDF
基于Authorware的网络题库的实现 被引量:4
2
作者 薛伟胜 王博亮 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第2期258-260,共3页
结合笔者在“福建省高校 2 0 0 0年网络课程与多媒体课件评比”中的获奖作品《计算机接口技术网上自测系统》 ,分析了利用Authorware技术与Asp技术建立网络题库的方法 .该方法能应用于各学科 ,以建立网络题库 ,因此具有普遍意义 .
关键词 AUTHORWARE 网络题库 ASP技术 高校 计算机接口技术网上自测系统 题库建设
下载PDF
Computer Network Control System in Automatic Automobile Detection
3
作者 高岩 窦丽华 +1 位作者 高琪 周宁 《Journal of Beijing Institute of Technology》 EI CAS 2001年第4期406-411,共6页
An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating r... An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating redundant design in work position substituting are presented. At last, the pivotal questions solved are discussed. With an advanced structure, this system is multi functional and flexible. Furthermore, advanced computer technology is adopted to improve its technical degree. 展开更多
关键词 computer control system local network automobile test error tolerance
下载PDF
产品内部连接测试新趋势
4
作者 梅杓春 《国外电子测量技术》 1999年第6期20-21,共2页
内部导线连接既费力又花钱,而且容易引起故障。设计师正采用新的方法以消除传统布线方式带来的麻烦。这对测试业提出了新的要求。本文阐述了产品内部连接测试的新趋势。
关键词 连线测试 内部连接 计算机测系统 产品
下载PDF
Network Management of Food Additives Quality Analysis and Inspection 被引量:3
5
作者 Hairui Zhang Guofu Zhang Li Zhang 《Journal of Chemistry and Chemical Engineering》 2015年第7期468-471,共4页
In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management ap... In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management applications are developed using the development technology of Visual Basic language and computer system operating environment, to achieve a network management software for users on food additives of quality analytical testing. The software sets up an information sharing network platform for enterprise and quality management departments, which is a major innovation in the food additive quality analysis on test management methods and tools. 展开更多
关键词 Food additives quality analysis Visual Basic language network management software development.
下载PDF
Reducing Item Exposure in Computerized Adaptive Testing Systems Using Automatic Item Generation 被引量:1
6
作者 Harutyun Terteryan 《Computer Technology and Application》 2014年第1期21-24,共4页
This paper studies the technics of reducing item exposure by utilizing automatic item generation methods. Known test item calibration method uses item parameter estimation with the statistical data, collected during e... This paper studies the technics of reducing item exposure by utilizing automatic item generation methods. Known test item calibration method uses item parameter estimation with the statistical data, collected during examinees prior testing. Disadvantage of the mentioned item calibration method is the item exposure; when test items become familiar to the examinees. To reduce the item exposure, automatic item generation method is used, where item models are being constructed based on already calibrated test items without losing already estimated item parameters. A technic of item model extraction method from the already calibrated and therefore exposed test items described, which can be used by the test item development specialists to integrate automatic item generation principles with the existing testing applications. 展开更多
关键词 Item exposure calibration IRT (item response theory) adaptive testing automatic item generation item model.
下载PDF
A Co-Point Mapping-Based Approach to Drivable Area Detection for Self-Driving Cars 被引量:5
7
作者 Ziyi Liu Siyu Yu Nanning Zheng 《Engineering》 2018年第4期479-490,共12页
The randomness and complexity of urban traffic scenes make it a difficult task for self-driving cars to detect drivable areas, Inspired by human driving behaviors, we propose a novel method of drivable area detection ... The randomness and complexity of urban traffic scenes make it a difficult task for self-driving cars to detect drivable areas, Inspired by human driving behaviors, we propose a novel method of drivable area detection for self-driving cars based on fusing pixel information from a monocular camera with spatial information from a light detection and ranging (LIDAR) scanner, Similar to the bijection of collineation, a new concept called co-point mapping, which is a bijection that maps points from the LIDAR scanner to points on the edge of the image segmentation, is introduced in the proposed method, Our method posi- tions candidate drivable areas through self-learning models based on the initial drivable areas that are obtained by fusing obstacle information with superpixels, In addition, a fusion of four features is applied in order to achieve a more robust performance, In particular, a feature called drivable degree (DD) is pro- posed to characterize the drivable degree of the LIDAR points, After the initial drivable area is characterized by the features obtained through self-learning, a Bayesian framework is utilized to calculate the final probability map of the drivable area, Our approach introduces no common hypothesis and requires no training steps; yet it yields a state-of-art performance when tested on the ROAD-KITTI benchmark, Experimental results demonstrate that the proposed method is a general and efficient approach for detecting drivable area, 展开更多
关键词 Drivable area SELF-DRIVING Data fusion Co-point mapping
下载PDF
Video-based construction vehicles detection and its application in intelligent monitoring system 被引量:1
8
作者 Wenyang Ji Lingjun Tang +2 位作者 Dedi Li Wenming Yang Qingmin Liao 《CAAI Transactions on Intelligence Technology》 2016年第2期162-172,共11页
While vehicle detection on highways has been reported before, to the best of our knowledge, intelligent monitoring system that aims at detecting hydraulic excavators and dump trucks on state-owned land has not been ex... While vehicle detection on highways has been reported before, to the best of our knowledge, intelligent monitoring system that aims at detecting hydraulic excavators and dump trucks on state-owned land has not been explored thoroughly yet. In this paper, we present an automatic, video-based algorithm for detecting hydraulic excavators and dump trucks. Derived from lessons learned from video processing, we proposed methods for foreground detection based on an improved frame difference algorithm, and then detected hydraulic excavators and dump trucks in the respective region of interest. From our analysis, we proposed methods based on inverse valley feature of mechanical arm and spatial-temporal reasoning for hydraulic excavator detection. In addition, we explored dump truck detection strategies that combine structured component projection with the spatial relationship. Experiments on real-monitoring sites demonstrated the promising performance of our system. 展开更多
关键词 State-owned land protection Construction vehicle detection Hydraulic excavator detection Dump truck detection Inverse-V feature Intelligentmonitoring system
下载PDF
A virtual machine-based invasion detection system for the virtual computing environment
9
作者 曾宇 Wang Jie +2 位作者 Sun Ninghui Li Jun Nie Hua 《High Technology Letters》 EI CAS 2006年第4期379-384,共6页
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra... Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain. 展开更多
关键词 virtual computing environment oriented virtual machine-based invasion detection system (VIDS) capacity services computing
下载PDF
Measuring Cuvette Simulation of Dielectrometer for Permittivity Investigation of High-Loss Substances
10
作者 Krasov P.S. Arkhypova K.A. Fisun A.I. 《Journal of Measurement Science and Instrumentation》 CAS 2011年第3期205-208,共4页
The method and instrument for permittivity measurements of high-loss substances as biological objects are presented.The results of improving the measuring cuvette by means of computer simulation and optimization of me... The method and instrument for permittivity measurements of high-loss substances as biological objects are presented.The results of improving the measuring cuvette by means of computer simulation and optimization of measurement system are described.The optimization carried out allows the application of the dielectrometer in the diagnostic test under development. 展开更多
关键词 dielectrometer WAVEGUIDE measuring cuvette reflection coefficient computer simulation
下载PDF
SIMULATION OF STRATA MOVEMENTS DUE TO UNDERGROUND MINING USING AN AUTOMATED MEASUREMENT SYSTEM FOR EQUIVALENT MATERIAL MODELING FACILITY
11
作者 张玉卓 YoginderP.Chugh 《Journal of Coal Science & Engineering(China)》 1996年第1期10-15,共6页
Strata movement simulation was conducted in an equivalent material modeling facility developed by the Department of Mining Engineering, Southern Illinois University at Carbondale, under U. S. Bureau of Mines contracts... Strata movement simulation was conducted in an equivalent material modeling facility developed by the Department of Mining Engineering, Southern Illinois University at Carbondale, under U. S. Bureau of Mines contracts. An innovative displacement measurement system called videogrammetric system was developed and utilized for recording, measuring and analyzing the deformation and failure process of the models. A room and pillar mining and a longwall mining prototypes were studied in the modeling. Study found that weak floor of coal seam plays an important role in pillar stability and therefore the overburden movements. 展开更多
关键词 equivalent material modeling strata movement videogrammetric system
下载PDF
THE METHOD OF DATA PROCESSING OF THE ELECTRICAL SURVEYING AND THE PROGRAM SYSTEM USED ON MICROCOMPUTER
12
作者 李志聃 高佛麟 《Journal of China University of Mining and Technology》 1990年第1期123-136,共14页
The ESS software package is prepared for electrical data processing in the fields of coal prospecting, hydrogeologicai engineering, and can be used in the other fields of electrical data processing. It can be operated... The ESS software package is prepared for electrical data processing in the fields of coal prospecting, hydrogeologicai engineering, and can be used in the other fields of electrical data processing. It can be operated on any kind of microcomputer which has an internal memories of more than 512kB.The ESS software package would be leading the office operation to an automatic data processing period and the field work free from the tedious, repeated data treating and mapping, so that the engineers would have more time to analyse and interpret field data. Undoubtedly, it is of benefit to improving the relibility of the geological evaluation. 展开更多
关键词 electrical survey electrical sounding digital processing electrical profiling.
下载PDF
MULTI-AGENT SYSTEM FOR WORM DETECTION AND CONTAINMENT IN METROPOLITAN AREA NETWORKS
13
作者 Gou Xiantai Jin Weidong Zhao Duo 《Journal of Electronics(China)》 2006年第2期259-265,共7页
Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated th... Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated them self to a first-class security threat to Metropolitan Area Networks (MAN). Multi-agent system for Worm Detection and Containment in MAN (MWDCM) is presented to provide a first-class automatic reaction mechanism that automatically applies containment strategies to block the propagation of the worms and to protect MAN against worm scan that wastes a lot of network bandwidth and crashes the routers. Its user agent is used to detect the known worms. Worm detection agent and worm detection correlation agent use two-stage based decision method to detect unknown worms. They adaptively study the accessing in the whole network and dynamically change the working parameters to detect the unknown worms. MWDCM confines worm infection within a macro-cell or a micro-cell of the metropolitan area networks, the rest of the accesses and hosts continue functioning without disruption. MWDCM integrates Worm Detection System (WDS) and network management system. Reaction measures can be taken by using Simple Network Management Protocol (SNMP) interface to control broadband access server as soon as the WDS detect the active worm. MWDCM is very effective in blocking random scanning worms. Simulation results indicate that high worm infection rate of epidemics can be avoided to a degree by MWDCM blocking the propagation of the worms. 展开更多
关键词 Multi-agent system Worm detection Worm containment Metropolitan area networks
下载PDF
Research on efficient edge-chasing deadlock detection/resolution for distributed systems
14
作者 程欣 Jin Feng Yang Xiaozong 《High Technology Letters》 EI CAS 2006年第4期408-412,共5页
Numerous edge-chasing deadlock detection algonthms were developed lor the cycle detection in distributed systems, but their detections had the n steps speed limitation and n ( n- 1) overhead limitation to detect a c... Numerous edge-chasing deadlock detection algonthms were developed lor the cycle detection in distributed systems, but their detections had the n steps speed limitation and n ( n- 1) overhead limitation to detect a cycle of size n under the one-resource request model. Since fast deadlock detection is critical, this paper proposed a new algorithm to speed up the detection process. In our algorithm, when the running of a transaction node is blocked, the being requested resource nodes reply it with the waiting or being waited message simultaneously, so the blocked node knows both its predecessors and successors, which helps it detecting a cycle of size 2 directly and locally. For the cycle of size n ( n 〉 2), a special probe is produced which has the predecessors information of its originator, so the being detected nodes know their indirect predecessors and direct successors, and can detect the cycle within n - 2 steps. The proposed algorithm is formally proved to be correct by the invariant verification method. Performance evaluation shows that the message overhead of our detection is ( n^2 - n - 2)/2, hence both the detection speed and message cost of the proposed algorithm are better than that of the existing al gorithms. 展开更多
关键词 distributed systems fast deadlock detection PROBE performance evaluation
下载PDF
UNDERGROUND MINE MONITORING AND COMMUNICATION SYSTEM
15
作者 孙继平 朱李平 《Journal of China University of Mining and Technology》 1994年第2期26-31,共6页
The authors studied the underground mine monitoring and communication system forthe highly preductive. effcient and safe mining.
关键词 MONITORING communtication SYSTEM
下载PDF
Development of testing techniques for mine fan performance
16
作者 吴征艳 蒋曙光 彭担任 《Journal of Coal Science & Engineering(China)》 2006年第2期53-56,共4页
Three progressive stages of testing techniques are elaborated,which are en-tirely manual operating,taking separate instruments testing and computer program con-trolling.The testing method and principle are detailed ba... Three progressive stages of testing techniques are elaborated,which are en-tirely manual operating,taking separate instruments testing and computer program con-trolling.The testing method and principle are detailed based on the testing process formeteorological parameters,air pressure,air quality and rotating velocity.And every testingtechnique is analyzed.Finally, the technique outlook is viewed.All this plays a leading rolein development of the testing techniques. 展开更多
关键词 mine fan characteristic parameter performance testing
下载PDF
Electro Energetic Technological Control in Eastern Siberia Railway 被引量:1
17
作者 Zakaryukin Vasiliy Panteleymonovich Kryukov Andrew Vasilievich Abramov Nikita Andreevich 《Journal of Energy and Power Engineering》 2012年第2期293-298,共6页
By system analysis and imitating modeling authors show the most effective modern techniques for railway electric systems control. Modem measure technologies PMU-WAMS and smart grid allow to solve real time tasks of ce... By system analysis and imitating modeling authors show the most effective modern techniques for railway electric systems control. Modem measure technologies PMU-WAMS and smart grid allow to solve real time tasks of centralizing control of railway electric systems. Quantity characteristics of control effectiveness are determined. According to computer modeling the situation approach is available for practical tasks of railway electric system control. 展开更多
关键词 Electric supplying RAILWAY electric traction technological control.
下载PDF
Conventional and Predictive Control Algorithms for Controlling Nonlinear Processes Using Multiple-Model Approach 被引量:1
18
作者 Ma'moun Abu-Ayyad Issam Abu-Mahfouz Amit Banerjee 《Journal of Mechanics Engineering and Automation》 2013年第1期22-28,共7页
The objective of this work is to formulate and demonstrate the methodology of multi-models for improving the performance of existing advanced control strategies. Multiple models are used to capture the nonlinear proce... The objective of this work is to formulate and demonstrate the methodology of multi-models for improving the performance of existing advanced control strategies. Multiple models are used to capture the nonlinear process dynamics relating to gain and time constant variations. The multi-model strategy was implemented on several controllers such as Smith-Predictor using PI (Proportional-lntegral) and GPC (Generalized Predictive Control). Computer simulations and experiments were conducted on several nonlinear systems and compared to the original form of these controllers. The enhanced approach was tested on controlling the screw speed of an injection molding machine and temperature of a steel cylinder. 展开更多
关键词 Multi-models Smith-Predictor generalized predictive control.
下载PDF
Determination of the limits for multivariate rational functions
19
作者 XIAO ShuiJing ZENG GuangXing 《Science China Mathematics》 SCIE 2014年第2期397-416,共20页
The purpose of this paper is to solve the problem of determining the limits of multivariate rational functions.It is essential to decide whether or not limxˉ→0f g=0 for two non-zero polynomials f,g∈R[x1,...,xn]with... The purpose of this paper is to solve the problem of determining the limits of multivariate rational functions.It is essential to decide whether or not limxˉ→0f g=0 for two non-zero polynomials f,g∈R[x1,...,xn]with f(0,...,0)=g(0,...,0)=0.For two such polynomials f and g,we establish two necessary and sufcient conditions for the rational functionf g to have its limit 0 at the origin.Based on these theoretic results,we present an algorithm for deciding whether or not lim(x1,...,xn)→(0,...,0)f g=0,where f,g∈R[x1,...,xn]are two non-zero polynomials.The design of our algorithm involves two existing algorithms:one for computing the rational univariate representations of a complete chain of polynomials,another for catching strictly critical points in a real algebraic variety.The two algorithms are based on the well-known Wu’s method.With the aid of the computer algebraic system Maple,our algorithm has been made into a general program.In the final section of this paper,several examples are given to illustrate the efectiveness of our algorithm. 展开更多
关键词 rational function LIMIT infinitesimal element strictly critical point rational univariate represen-tation (RUR) Wu's method transfer principle
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部