2016 (467)
2015 (448)
2014 (181)
2013 (81)
2012 (22)
2011 (22)
2010 (20)
2009 (22)
2008 (10)
Construction of Agricultural E-commerce Platform in China
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The decentralized management of agricultural production is inconsistent with the big market and circulation in China. Agricultural e-commerce platform can help connecting supply and demand better. The paper analyzes the application and characteristics of agricultural e-commerce in China and points out that the construction of agricultural e-commerce platform is the first step in the development of agricultural e-commerce. Combined with the situation and characteristics of the Chinese agriculture, several construction frames are given for the development of agricultural e-commerce platform. For example, big enterprises build third party agricultural public trade platform under the guide of the government based on market operation. And then local government may lead to construct collaborative agricultural e-commerce platform to integrate the local resources. At the same time, some strategies should also be implemented in order to realize the sustainable development of the platform, especially the application of mobile e-commerce.
Robot Manipulator Path Planning Based on Intelligent Multi-resolution Potential Field
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.11-26
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Robot path planning is an important part of the development of autonomous systems. Numerous strategies have been proposed in the literature regarding mobile robots but trajectory planning for manipulators is considerably more difficult since the entire structure can move and therefore produce collisions with surrounding obstacles. This paper presents an original solution and analytical comparison to path planning for manipulator arms. Path planning is executed in two parts: first, a global path is found to guide the end-effector in the environment using artificial potential fields and multi-resolution occupancy grids, then, a local path is determined for the entire robot structure by considering the kinematics of the robot as well as the repulsive forces of nearby obstacles in a fuzzy logic controller. Results are shown from a simulator that has been built for this purpose. The contribution of this research is to develop a robust solution for path planning with collision avoidance: one that can be used for various manipulator arms and environment configurations.
Optimization Design of Wind Turbine Blade based on MATLAB
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.27-36
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The author to Willson wind turbine blade optimization design mathematical model, draw the corresponding program block diagram, and use MATLAB high-level programming language to write the wind turbine blade aerodynamic design program. Application of the design program design, the manufacture of the small wind turbine model, and through the actual vehicle test on the pneumatic performance. Experiment proves that the application of MATLAB high-level programming language design of wind turbine blade to realize the maximization of wind energy use efficiency; Matching with spring type variable propeller torque mechanism, but also realized the author predicted low wind speed large output, high wind speed steady output of the ideal effect, in order to solve the low wind speed wind turbine start-up, big wind speed under the condition of the wind turbine output is too large under the condition of the problem of difficult to control provides a new train of thought.
Application of Geospatial Technology for the Promotion of Tourist Industry in Srinagar City
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.37-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Tourism is a relaxation place for people and people can plan their tourist places based on Information. GIS -based information is gaining greater importance among tourists as it allows to familiarize with places, have profound appeal for the trip planning. Srinagar city is famous tourist destination of India, visited by huge number of tourists from different parts of the world annually. The number of tourists visited the city in 1990 was 10623 which increased to 112012 in 2000 and in year 2013 more than 13 lakh, the number can be dramatically increased, given the nature of tourism potential of the city. But in the absence of Tourist Information System, tourists face various difficulties in locating various tourist related products. The Geospatial technology has transformed every sphere of life and tourism industry cannot be exception. The purpose of the present study is to develop an interactive and user-friendly Geographic Information System (GIS) enabled data base for various amenities viz. hotels, guest houses, house boats, road networks, airport, railway station, parks, shrines, play grounds, golf course, water bodies etc. in ESRI’s ArcGIS 10.1 software which could be easily uploaded on web to disseminate proper information to world over. Toposheets, maps satellite images, GPS and field surveys were used to generate the above mentioned data layers and then multimedia data like video clips, audio narrations and photographs were integrated with each feature to make comprehensive tourist information system. A major strength of this paper is that TIS is one time investment and can be updated as and when needed. It provides tools to display raw data in the form of 3D maps, SQL, understand Patterns, relationships and trends and overlay those databases in highly interactive ways which is not possible with traditional spreadsheets. The present study actively demonstrated the potential of geospatial technology application to explore destination and its facilities like hospitals, ATM Centers, hotels, restaurants, resorts and filling stations etc. and developmental planning, project monitoring and publicity of tourist products. The present study can be indispensable for other allied departments’ viz police, planning, public administration, disaster management, transportation, health etc.
A Fast and Accurate Algorithm for Detecting Community Structure in Social Networks
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.51-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Studies of community structure and evolution in large social networks require fast and accurate algorithms for community detection. Among the existing algorithms for community detection, the label propagation algorithm (LPA) and the Newman modularity Q algorithm (NMA) have been widely used and studied in the community detection in large social networks, since the LPA has the advantages of near-linear running time, easy implementation and without requiring parameters, and the NMA is a relatively fast algorithm and has a clear metrics to measure community structure. However, the LPA has the shortcomings that the result of the community detection is instable and has a low quality. At the same time, disadvantages of the NMA are that it bases its decisions on purely local information about individual communities and gets the local optimal solution. In this paper, combined with these two algorithms, we propose a new community detection algorithm (LP-NMA), which extends the above two algorithms (the LPA and the NMA is a special case of the new algorithm respectively). The new algorithm not only retains the advantages of these two algorithms, but also has improved the stability and quality of community detection. Experiments on real social networks have proved that this method is better than the original LPA and NMA.
Empirical Review of Production, Productivity and Marketability of Soya Bean in Ethiopia
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.61-66
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This review of research presents recent Soybean related studies conducted in Ethiopia. After a brief contextualization of the discourse regarding Soybean market chain, production and productivity researches globally, materials specific to Ethiopia is discussed in argument, synthesizing the types of findings, summarizing the trends and highlighting knowledge gaps. A review of this nature makes diverse research results available and accessible, facilitates knowledge translation and enables researchers to identify areas for future research.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.67-78
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.79-90
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the network innovation environment, the knowledge trading between enterprises could be divided into traditional pattern (TP) and the E-commerce pattern (ECP). The two both have their advantages and disadvantages, so enterprises would face the problem. This paper generalizes the operation characteristics and the influence factors of two patterns. The mathematical model is used to analyze the selection mechanism of choosing two patterns, and the result illustrated that when the agency fee, the risk cost of ECP and the trading potential get bigger, the possibility that enterprises choose TP would get bigger, too; and when the explicitness of knowledge, cost of searching, trading incentive, the risk cost of TP and the reserve cost of ECP increase, the possibility that enterprises choose ECP would increase. When the reserve cost of ECP becomes big enough, it would make enterprises be more willing to choose hybrid pattern.
The Influence of Megatren System on Ridership in Metro Manila
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.91-104
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The inauguration of the Metro Rail Transit (MRT-2) or Megatren in line 2 with a total length of about 13.8 km and run from Santolan, Pasig City to Recto in Manila marked the comeback of the train as an important passenger mode of transport in the Philippines. Since then high speed train (HST) services have been introduced in ASEAN countries and are planned in many more, and the train has once more become the dominant mode of transport on many routes. This review summarizes the efficiency of the expanded rail network system which is quite modern through the application of technology and scientific principles by means of modern ways of transportation engineering for managing the facilities of MRT-2 system. The study further concludes that MRT-2 is less cost-efficient than private transportation, the benefits of MRT-2 such as aesthetics, providing transit for the poor, potential economic development spillovers, and reducing congestion and pollution—must all be considered in the cost-benefit analysis of MRT-2.
Possibility Distribution of Wind Power Fluctuation
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.105-116
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Volatility is the fixed property of wind power, how to describe the volatility of wind power quantitatively lacks effects methods currently. Based on the analysis of large quantities of testing data, it can be found that it is possible to adopt normal distribution to describe the possibility distribution of wind power fluctuating characteristics. Analysis demonstrates that min level component of wind power nearly occupies 2%-5% of the installed capacity of wind power station: when multiple wind power station outputs are overlapped, it can effectively reduce the proportion of min level component: the type of fans has very tiny effects on wind power fluctuation characteristics, but the current wind power out of wind power station has almost on influence on wind power fluctuation characteristics. Normal distribution also adapts to describe the possibility distribution of averaged power variation in adjacent time interval of wind power station, after the time interval is lengthened, due to decreased wind speed correlations, fluctuation characteristics of averaged power in adjacent intervals enhance.
Examining Mobile Payment User Adoption from the Perspective of Trust
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.117-130
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper explored the critical factors influencing users’ intention to adopt mobile payment from a trust perspective. The results are based on a survey sample of 193 participants. SmartPLS2.0 is employed in the data analysis. The findings indicate that perceived ease of use, perceived usefulness, structure assurance and ubiquity have significant effect on users’ trust, which further affect user usage intention. Thus mobile service providers need to concern trust to facilitate user adoption and usage of mobile payment services.
American Sign Language Translation through Sensory Glove; SignSpeak
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.131-142
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To make a communication bridge, a highly accurate, cost effective and an independent glove was designed for deaf/mute people to enable them to communicate. The glove translates the sign language gestures into speech according to the American Sign Language Standard. The glove contained flex and contact sensors to detect the movements of the fingers and bending of the palm. In addition an accelerometer was built in the glove to measure the acceleration produced by the changing positions of the hand. Principal Component Analysis (PCA) was used to train the glove into recognizing various gestures, and later classify the gestures into alphabets in real time. The glove then established a Bluetooth link with an Android phone, which was used to display the received letters and words and convert the text into speech. The glove was found to have an accuracy of 92%.
Research and Implementation of User Features Mining Model without Labels in Social Networks
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.143-154
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Under the tide of information technology revolution, social network services (SNS) become a typical application in Web2.0 era by its rich and interactive user participation, and has swept the world in a short time. More and more users begin to express themselves on Facebook, Micro-blog and other social networks, and user features are existing in the SNS in a more intuitive way. These information assign complete personality and image for each node in the SNS, which has enormous potential commercial value. For background, this paper studies the user features mining problem in social networks, and focuses on the user features without labels. Firstly, two models are established for user features mining without labels, in which clustering, classification, text mining and graph mining are used in the model. Then, the proposed models are implemented under two scenarios: user interest discovery and Micro-group structure discovery. Experiment results based on Sina Micro-blog show that the accuracy is above 80%, which can meet the demand of user features mining in social networks. Therefore, the techniques proposed in this paper are feasible.
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.155-164
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
For the insufficient of existing algorithms of redundant-reader elimination, the paper proposes a data-cleaning algorithm based on communication information among readers. This algorithm is no longer dependent on the tag to send information between the RFID readers, but to transmit information directly through communication information among the readers to determine which reader the tag belongs to and whether the reader is redundant or not. This paper does a lot of experiments to verify the effectiveness of the algorithm.
Intelligent Mechatronic Model Reference Theory for Robot End-effector Control
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.165-172
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The control problem for manipulators is to determine the joint inputs required to case the end-effector execute the commanded motion. The nonminimum phase characteristic of a rigid manipulator makes the design of stable controller that ensures stringent tracking requirements a highly nontrivial and challenging problem. A useful controller in the computed torque family is the gravity controller. To compensate the dynamic parameters, fuzzy logic methodology is used and applied parallel to this method. When the arm is at rest, the only nonzero terms in the dynamic is the gravity. Proposed method can cancels the effects of the terms of gravity. In this case inorder to decrease the error and satteling time, higher gain controller is design and applied to nonlinear system.
Business-Driven Process Fragment Selections in RESTful Business Processes
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.173-186
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Past work showed that runtime adaptability of business processes can be improved by applying Representational State Transfer (REST) to design and implementation of business processes. However, the existing solutions for RESTful business processes (RESTfulBP) were focused on manual selection of process fragments to be composed at runtime. In this paper, we propose solutions that enable semi-automatic selection of process fragment at each decision-making point of RESTfulBP. The new built-in middleware MiniZnMASC can provide user based process fragment advice to knowledge workers in ways that achieve better overall business value while satisfying all existing constraints. In addition, we redesign the architecture of RESTfulBP in order to allow the business-driven decision-making solutions. The solutions are evaluated for feasibility, functional correctness, business benefits, and performance.
Research on China's Steel Demand Using Combined Forecast
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.189-200
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This research conducts an error analysis between the forecasting value and the actual value of steel demand of 2010 in China, which is based on the analysis of forecasting methods and their results of Chinese steel demand in the existing studies, and then forecasts China’s steel demand in 2015 by making use of a combined forecasting method. The combined forecasting method includes two stages. In the first stage, with reference to actual steel demand of China in 2010, a threshold is set and some forecasting results are selected according to the error between the forecasting value and actual value of steel demand of each method. In the second stage, weights of corresponding selected methods are determined which are based on the error. And the final demand of China’s steel in 2015 is forecasted through the combined forecasting method.
Design High Precision Intelligent Nonlinear-Based Controller
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.201-210
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Computed torque controller (CTC) is a significant nonlinear controller under condition of partly uncertain dynamic parameters of system. This controller is used to control of highly nonlinear systems especially for robot manipulators, because this controller is a robust and stable. Conversely, computed torque controller is used in many applications; it has an important drawback namely; nonlinear equivalent dynamic formulation in uncertain dynamic parameter. The nonlinear equivalent dynamic formulation problem in uncertain system can be solved by using artificial intelligence theorem. However fuzzy logic controller is used to control complicated nonlinear dynamic systems, but it cannot guarantee stability and robustness. In this research parallel fuzzy logic theory is used to compensate the system dynamic uncertainty in computed torque controller.
A Self-organization Analysis of Knowledge Collaboration with Enterprise 2.0 Application
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.211-220
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The development of Web 2.0 and its social application lead to the appearance of Enterprise 2.0. Based on the discussion of self-organization of enterprise knowledge system in Enterprise 2.0, this paper built a super-network model integrated the interpersonal network and the knowledge object network as well as the definition of the super-network structure entropy. Take the knowledge governance as a regulator variable between enterprise knowledge system and its environment, a relationship between the performance of knowledge collaboration and structure entropy has been built, then a Logistic Growth Model has been proposed to analysis the self-organization process.
An Epidemic Model of Information Dissemination in Mobile Social Networks
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.221-230
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a new model for information dissemination in mobile social networks. The dynamic equation of information dissemination is modified. Moreover, we investigate numerically the behavior of the model on a real scale-free social site with the exponent γ =1.08. We find that initial spreaders with big out-degree of can accelerate information dissemination, and the nodes with large in-degree would be easier to be a spreader or to become to stiflers.
GSM Verification Based Secure E-Voting Framework
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.231-238
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Application of computer technology in human life is increasing geometrically. People are depending on this global network technology (internet) for shopping, banking, education etc. For this technological world people live different cities for their personal jobs. At that pur-poses they do not want to come back to their own constituency only to apply their vote. Elec-tronic voting (evoting) can be a viable alternative to solve this problem. In this paper, new evoting architecture has been proposed which ensure voter’s annomity. By implementing this architecture any voter can employ their vote from anywhere of the world. This architecture will also allow traditional voting besides electronic voting ensuring security and unique vote per voter. In this architecture cryptographic techniques has been proposed to overcome the security threats, also ensure voter’s anonymity. Considering security issue two step security has been proposed in this framework.
A Reduction Algorithm for Fractional Order Transmission Line Modeling with Skin Effect
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.239-250
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we deduce a fractional-order model based on skin effect for frequency dependent transmission line model. The voltages and currents at any location in transmission line can be calculated by the proposed fractional partial differential equations. Then the fractional ordinary differential equation can obtained from the transmission line fractional partial differential equations through the discrete space and the fractional order differential item of approximation to replace. In practical, there are tens of thousands of turns in transformer winding, and the order of parameter matrix is very large, so we define a new plane based on the Laplace transformation and propose a model order reduction (MOR) method for the fractional order system. And combine with the new distributed distance points, the voltages and currents can be calculated.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.251-266
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To study the impact of fundamental flow and background harmonics on harmonic and resonance characteristics of high-speed train-network coupling systems, harmonic admittance matrix model for four quadrant converter is deduced with the method of FFT and Bessel function. Equivalent load of train and chain network model of multiple conductors was established to conduct the calculation of fundamental and harmonic flow. Based on all of these, realize the harmonic and resonance research of train-network coupling system with multiple trains, which offer the reference to safe operation and avoid the voltage peaks in actual supply network.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.267-276
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To achieve network-wide time synchronization in multi-hop wireless sensor networks (WSN), this paper proposes an accurate and energy-balanced time synchronization algorithm based on flooding. Flooding Time-Synchronization Protocol (FTSP) has advanced features, such as implicitly dynamic topology and high time accuracy, which can't be affected by some node's losing. FTSP propagates its time information of the reference node without concern about the network topology. However, in large-scale WSN applications, the efficiency of FTSP will be reduced drastically because of serious network storm. Meanwhile, the energy consumption of the network breaks the energy balance. In this paper, our aim is to solve the problems of synchronization error accumulation and unbalanced energy consumption. Our theoretical findings and experimental results show that forbidding possibly invalid forwarding among the sensor nodes drastically improves the synchronization accuracy and performance of energy-balanced.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.277-288
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
T Bayesian network methodology taking place of fault tree analysis used for reliability assessment has gotten lots of attention in recent years. On basis of the current Bayesian network method used for calculating structural importance degree, a new Bayesian network method is raised. This new method can avoid repeat modification of the parameters in the conditional probability tables, and hence the intermediate results computed during inference process can be shared to decrease calculating complexity. The new method is proved to be correct in a mathematic way and a corresponding algorithm named SID_Jointree for realizing this new method is designed, which guarantees the new method can be realized in computer. Finally, the correctness and efficiency of the new method is validated by using two fault tree cases.
Investigation on the Data Processing in Automation Monitoring System Designed for Dam Deformation
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.289-300
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Deformation monitoring for dam is quite important and it can be directly used to reflect the running status to keep the operation safely. In order to meet the demand for monitoring the dam, global position system (GPS) is used to develop a monitoring system with high efficiency. In this paper, we developed a monitoring system for deformation monitoring for the dam with wireless data transmission. In order to reduce the energy consumption, the regulation of its working condition has been redesigned according to the monitoring object's own characteristics. At the same time, the data compression is also used in the GPS data processing to reduce the energy consumption. The compression method is divided into two steps. In the preprocessing, data amount can be removed about half of the amount, and Hoffman coding compression rate and the style conversion compression ratio are relatively small. The total compression rate is more than 60%. Compared with the existing compression algorithms, the new developed method has higher compression rate. When the data collection rate is higher, the compression will be higher, and the reason may be that the time information and position information are compressed when the data collection rate is higher. This method can be used to process the data effectively and improve the data transmitting efficiency.
Trajectory Optimization for Spacecraft Using a Second-Order Gauss Pseudo Spectral Method
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.301-310
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An optimal control problem for the trajectory of spacecraft under nonlinear constraints is presented. The second-order Gauss pseudo spectral method(GPM) is described for solving the problem numerically. Based on the first-order GPM, the differential matrix of the second-order GPM is derived. The dynamic equations and its constraints are approximated by the two methods. The terminal state constraints of the second-order GPM are converted to two constraints: terminal state variables and the first-order derivative constraints. The first-order GPM and second-order GPM are compared in terms of the accuracy of the state and control, the number of variables in NLP, the convergence time. A key feature of the second-order method is that it provides a more accurate and efficient way than the first-order method, due to reducing the number of variables in the nonlinear programming problem that is transcribed. A numerical example is used to identify the key differences between the two methods. The results of this study indicate that the first-order and second-order Gauss methods are very similar in accuracy, while the computational efficiency of the two methods is significantly different, for the numerical solution of nonlinear optimal control problems.
Research on Electromagnetic and Dynamic Properties of LPMBLDCM for Electromagnetic Launch
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.311-322
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to improve the thrust characteristics of moving-magnet type linear permanent magnet brushless DC motor (LPMBLDCM), the structural characteristics and magnetic field are analyzed. The influence of electrical parameters and structural parameters on the electromagnetic properties and thrust performance are researched by finite element analysis (FEA). The cogging force, back electromotive force (back-EMF), air-gap magnetic field distribution, mover velocity as well as thrust output are studied by taking some practical parameters into account, including pole/arc coefficient, air-gap width, voltage and current. The LPMBLDCM system is established, and some relevant tests are taken to verify the simulation results. Simulation and experimental results show that the thrust and mover velocity are mainly affected by some key parameters. The results will surely provide the reference and guidance for the optimization of electromagnetic and thrust characteristics of LPMBLDCM.
The Research on AUV Attitude Control based on least Squares Support Vector Machines
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.323-332
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The Attitude control model for AUV is highly nonlinear and strong coupling six degrees of freedom model. With it, and complex disturbance of the marine environment a new control strategy chaos least squares support vector machines is proposed. The control model is infinitely approximated by least squares support vector machine. The parameters are optimized Chaos theory. It is formed the Chaos-LSSVM model. The purpose is to obtain excellent attitude control of quality. The Chaos-LSSVM predictive controller for AUV attitude is designed combined with a simplified longitudinal hydrodynamic equations and the Chaos-LSSVM model. Meanwhile the stability of the attitude control system is ensured by the Lyapunov stability theory. Finally, examples of simulation results show that the control model can obtain a good control effect, improve the underwater vehicle dynamic positioning attitude control effectiveness and robustness.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.8 No.1 2015.01 pp.333-346
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to lower the classification cost and improve the performance of the classifier, this paper proposes the approach of the dynamic cost-sensitive ensemble classification based on extreme learning machine for imbalanced massive data streams (DCECIMDS). Firstly, this paper gives the method of concept drifts detection by extracting the attributive characters of imbalanced massive data streams. If the change of attributive characters exceeds threshold value, the concept drift occurs. Secondly, we give Cost-sensitive extreme learning machine algorithm, and the optimal cost function is defined by the dynamic cost matrix. Build the cost-sensitive classifiers model for imbalanced massive data streams under MapReduce, and the data streams are processed in parallel. At last, the weighted cost-sensitive ensemble classifier is constructed, and the dynamic cost-sensitive ensemble classification based on extreme learning machine classification is given. The experiments demonstrate that the proposed ensemble classifier under the MapReduce framework can reduce the average misclassification cost and can make the classification results more reliable. DCECIMDS has high performance by comparing to the other classification algorithms for imbalanced data streams and can effectively deal with the concept drift.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.