http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
New discovery of pulse arc shape of sheet tungsten electrode
Li Yuanbo,Ye Tao 대한기계학회 2022 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.36 No.5
The synergistic effect of sheet tungsten electrode and pulse current can further reduce the heat input, effectively regulate the arc plasma jet behavior, change the arc flow characteristics, and produce a new arc shape which the arc would shrink at the electrode and expand in the middle of the arc column. The main reason for the new arc shape is the interaction between cathode and anode jets; when these two meet in the middle of the arc column, the velocity decreases significantly and results in a stagnation layer. The intensity of the cathode jet changes with the peak current, argon flow rate, and arc length, causing the stagnation layer to migrate along the arc length direction.
Research on Fuzzy Dynamic Location-Routing Problem of Victim Search in Flood Disaster
Shouying Li,Huijuan Zhou,Yuanbo Li 보안공학연구지원센터 2016 International Journal of u- and e- Service, Scienc Vol.9 No.7
For the dynamic of the number of rescue nodes, the number of person at the rescue node, the number and location of rescue boats, the uncertainty of rescue time (travel time of boats and rescue time of workers), the paper established a dynamic fuzzy rescue time Location-Allocation Problem (LRP) model. To ensure that the decision makers could make new decisions in a very short period of time according to the dynamic data update. A matching hybrid genetic algorithm containing heuristic rule was introduced according the characteristics above. The algorithm used three-stage real-code that represents the search order of boats. The search order and the heuristic rule determined the rescue completed moment of each rescue nodes. The simulated test analysis shows the validity and the correctness of the model and algorithm.
Study on Improved Algorithm for Image Edge Detection Based on Genetic Fuzzy
Xiaoguang Li,Bianxia Wu,Yuanbo Li 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.7
Aiming at the existing edge detection algorithm of edge vague, the pseudo-edge cannot be removed and algorithm results do not achieve optimal results by virtue. In order to improve the reliability and effectiveness of edge detection, the proposed optimization tool template coefficient method, to design the coding, Sobel filter and fitness function of genetic fuzzy clustering algorithm. Through interpolating, smooth handling and filtering with the updated active contour model. Based on the traditional edge detection algorithm is analyzed, combined with fuzzy membership functions and genetic operators for edge detection algorithm was improved by genetic fuzzy clustering. Through the simulation results showed that this new algorithm was feasible. Theoretical analysis and experimental results demonstrate that, the new algorithm in this paper is highly antinoise and able to get better image edges.
A Novel Nonlinear Optimization Coverage Algorithm in Wireless Sensor Networks
Huiling Peng,Zeyu Sun,Yuanbo Li 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.7
Maximize coverage and prolong the network lifetime for wireless sensor networks has become one of the key topics of research. For this, put forward a kind of node scheduling strategy based on covering algorithm. The algorithm by Poisson distribution model structure node density formula, according to the node density formula in the monitoring region deploying to effective coverage; On the other hand, through the node state scheduling mechanism updates as well as to the neighbor node, can be made of residual energy of nodes and monitoring the area sensor the node energy consumption balance, so as to prolong the network lifetime goal. The simulation results show that, the algorithm cans not only useless nodes completely too effective coverage, improve the coverage while optimizing the cyber source configuration, prolong the network lifetime.
Evaluation Model Queuing Task Scheduling Based on Hybrid Architecture Cloud Systems
Zeyu Sun,Yaping Li,Yangjie Cao,Yuanbo Li 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.6
The applications based on cloud computing platform usually need to use a number of computing resources and storage resources to completing computing tasks, so the fault-tolerant capability of system has become increasingly important. Aiming to solve this problem, an evaluation model of task scheduling is proposed based on cloud system (TSCS). TSCS can effectively model and simulate complex cloud systems due to its strong capabilities of quantitative evaluation and behavioral description resulting from combining the theoretical characteristics of queuing task theory and Petri net. The algorithm solves the problem that meeting customer service satisfaction and load balancing at the same time. In addition, consider single backup task status, for the failure of more than one processor at the same time, present the minimum cost of backup scheduling algorithm, the algorithm to solve the problem that require a lot of backup cost. Experimental results show that TSCS is able to effectively reflect the architecture characteristics of various cloud system at the perspectives of performance, service, etc., and highly simulated various kinds of dynamic service behaviors of cloud system, single workload and multi workloads shows that the proposed policy can finish the user’s queuing task scheduling before deadline as well as obtain approving cost efficient.
HSKAS : A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks
Zeyu Sun,Xiaohui Ji,Yuanbo Li 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4
Wireless sensor networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. However, due to the influence of environment and dynamic topology, the communication radiuses of all nodes are no strictly consistent, which may cause different neighbor number and redundant neighbors for one central node. In this paper, we present a key agreement scheme without the trusted third parties by exploiting the special characteristics of Hopfield neural network: the two nodes converge in a steady state from their respective initial states after iterating finite times, while maintaining the confidentiality of the key by quantifying the key to strings. Compared to existing solution, the proposed method requires less memory and has lower communication overhead to key agreement.
Zeyu Sun,Chuanfeng Li,Yalin Nie,Yangjie Cao,Yuanbo Li 보안공학연구지원센터 2016 International Journal of Hybrid Information Techno Vol.9 No.9
MIMO system performance mainly by correlation of spatial interference presence and space, In order to overcome these effects, it is necessary by pre-coding technology to achieve, Here we mainly use block diagonalization algorithm both linear pre-coding for analysis and further integration of the average power allocation algorithm and power allocation algorithm MATLAB simulation. Through research and data analysis, system performance block diagonalization algorithm is better than under zero forcing algorithms. When the same number of transmit antennas, the number of receive antennas are the same, the average power and power calculation algorithm with SNR increases, can effectively channel capacity to achieve the desired optimum value.
Zeyu Sun,Chuanfeng Li,Yuanbo Li 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.8
In the process of coverage for multiple targets, due to the existence of a large number of redundant data make the effective monitoring area coverage decreased and force the network to consume more energy. Therefore, this paper proposes a multi-target k-coverage preservation protocol. First of all, establish the affiliation between the sensor nodes and target nodes through the network model, present a method to compute the coverage expected value of the monitoring area; secondly, in the network energy conversion, using scheduling mechanism in sensor nodes to attain the network energy balance, and achieve different network coverage quality through different nodes energy conversion. Finally, simulation results show that NMCP can effectively reduce the number of active nodes meeting certain coverage requirements and then improve the network lifetime.
A Nonlinear Multiple-target Coverage Protocol Based on Data Integration of Wireless Sensor Networks
Zeyu Sun,Yongsheng Zhang,Chuanfeng Li,Yangjie Cao,Yalin Nie,Yuanbo Li 보안공학연구지원센터 2016 International Journal of Smart Home Vol.10 No.10
In the process of coverage for multiple targets, due to the existence of a large number of redundant data make the effective monitoring area coverage decreased and force the network to consume more energy. Therefore, this paper proposes a multi-target k-coverage preservation protocol. First of all, establish the affiliation between the sensor nodes and target nodes through the network model, present a method to compute the coverage expected value of the monitoring area; secondly, in the network energy conversion, using scheduling mechanism in sensor nodes to attain the network energy balance, and achieve different network coverage quality through different nodes energy conversion. Finally, simulation results show that NMCP can effectively reduce the number of active nodes meeting certain coverage requirements and then improve the network lifetime.