http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Adaptive Fuzzy Control for Unknown Nonlinear Time-Delay Systems with Virtual Control Functions
Tao Guo,Guoying Liu 제어·로봇·시스템학회 2011 International Journal of Control, Automation, and Vol.9 No.6
In this paper, adaptive fuzzy control is presented for a class of unknown nonlinear time-delay systems with virtual control functions. By employing fuzzy logic systems and the technique of delay replacement, dynamic surface control (DSC) design approach can be carried out with both unknown delay signals and nonlinearities. This is different from the existing results, which are used to make limitations on the time-delays. It is proved that the proposed design method is able to guarantee semiglobal uniform ultimate boundedness (SGUUB) of all signals in the closed-loop system, with arbi-trary small tracking error by appropriately choosing design constants.
Guo-Bo Xu,Tao Yang,Jin-ku Bao,Dong-Mei Fang,Guo-You Li 대한약학회 2014 Archives of Pharmacal Research Vol.37 No.5
Isochaetomium A2 (1), a new bis(naphthodihydropyran-4-one), along with chaetochromins A (2) and B(3), was isolated from the solid-state fermented rice cultureof Chaetomium microcephalum. The structure of compound1 was elucidated on the basis of 1D and 2D NMRspectral data, and the relative configuration was confirmedby CD spectrum. Compounds 1–3 possessed significantantimicrobial activity against Escherichia coli 1.044,Staphylococcus aureus 1.252, and Bacillus subtilis 1.079. Moreover, compounds 1–3 showed obvious inhibitoryeffects on mouse spleen cell proliferation with successiveIC50 values of 0.52, 0.19, and 0.24 lM.
A Novel Method of Protection of Monitor Link
Guo Hong-tao 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.1
Automation control systems demand high availability by providing its’ users with reliable and uninterrupted service. Traditional monitor system fails to provide reliable service due to lack of protection of monitor link. It also requires TCP/IP, X.25, E1 and other interfaces to realize monitoring channels such as setting monitored object, reporting status information of monitored call, reporting voice data of monitored call. The organization of the system is very complicated. Besides, some old devices can’t provide all the interfaces. Thus these old devices can’t have access to the lawful interception system. This paper presents a method to provide the ability of monitor link protection under abnormal circumstance. This method offers complete monitor link protection with fewer interfaces. According to the result of experiment and practical application in many countries, the availability and reliability of the interception system have been greatly improved by using this method.
TETRAVALENT SYMMETRIC GRAPHS OF ORDER 9p
Guo, Song-Tao,Feng, Yan-Quan Korean Mathematical Society 2012 대한수학회지 Vol.49 No.6
A graph is symmetric if its automorphism group acts transitively on the set of arcs of the graph. In this paper, we classify tetravalent symmetric graphs of order $9p$ for each prime $p$.
Fast Authentication Method for Wireless Local Area Network
Guo Hong-tao 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.6
WLAN (wireless local area network) connect the users and the network by using radio frequency signals. It reduces network cabling between the terminals and the network equipment. Thus WLAN has the following benefits: giving end users a great deal of mobility, convenience, saving network cabling project costs. WLAN can share the wireless traffic of 2G or 3G network. But WLAN authentication from the safety and convenience of comprehensive consideration has not been a fine solution. This paper analyzes the various existing problems of authentication used in the field of WLAN. A fast authentication method is proposed in this article considering the character of the terminal user. Compared with existing authentication methods, this method is fast, it improves the system applicability under the comprehensive consideration of accessibility and safety. This method is validated by experiments, so that users can easily access secure WLAN systems.
Experimental study on U-shape flat thermosyphon for thermal management of power battery
Tao Wang,Sicong Tan,Cong Guo,Hongchao Su,Chaohong Guo,Yuyan Jiang 대한기계학회 2021 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.35 No.9
The paper presents a new type of U-shape flat thermosyphon. The thermosyphon has several unique properties relative to general heat pipe such as compact and simple structure (no wick structure), easily to filling the coolant and flexible plate structure and so on. These properties make it an ideal heat transfer device for battery pack thermal management. In this paper, we experimentally study the thermal management performance of the U-shape flat thermosyphon for a battery module. The temperature of the battery module can be controlled below 50 °C under 1.5 C charge rate (300 W), and below 37 °C under 1 C charge rate (120 W), and the corresponding maximum temperature difference is 3 °C and 7 °C, respectively. And higher power generation is helpful to start-up the U-shape flat thermosyphonand maintain a small temperature difference between different battery cells. The performance of the U-shape flat thermosyphonis evaluated using a thermal resistance network model, which showed that there is uneven distribution of heat transfer in the two side of the heat pipe.
A Novel Man-Machine Command System
GUO Hong-Tao 보안공학연구지원센터 2016 International Journal of Smart Home Vol.10 No.5
In embedded system, man-machine command system is the main way for people to use the system. The command in man-machine system often needs upgrade. It is a hard work to upgrade the old command with the new version of the command. A novel man-machine command system proposed in this paper can be used to upgrade the command system in a smooth way. The method comprises: split the embedded system into different operating states, provide two command versions (old version and new version), and attach different privileges according to system operating states and command version. According to the current operating status of the system and the privilege of the command, it is determined whether or not to execute the command and whether or not prompt information about the command to be upgraded should be shown to the user. By using the method proposed in this paper embedded software can be a smooth upgrade. The old version command can continue to use, and the progress of the new version command replacing old version command will be a smooth progress.