Aiming at the problem of the effect of changes of large scale terrain rendering on the frame rate, this paper presented a data dynamic scheduling method based on quaternary tree LOD model, and using the node traversal of quaternary tree with the GPU parallel acceleration node, Increasing the motion vector, the observation vector and the fluctuation degree of the ground as the judging factors to achieve fast rendering of large-scale terrain, applying the rule that the layers of the adjacent terrain being not more than one, to solve the crack problem that often appears in the rendering scene, to realize the function of the real-time dynamic 3D visualization of large-scale terrain scene of 3D GIS. The experimental results show that, the method accelerating terrain loading through coordination of CPU and GPU, making the process of terrain rendering have good real-time and stable frame rate.
{"title":"Research on Terrain Visualization Based on LOD Dynamic","authors":"Jiang Yi, Liu Zhao","doi":"10.1109/ICMTMA.2015.222","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.222","url":null,"abstract":"Aiming at the problem of the effect of changes of large scale terrain rendering on the frame rate, this paper presented a data dynamic scheduling method based on quaternary tree LOD model, and using the node traversal of quaternary tree with the GPU parallel acceleration node, Increasing the motion vector, the observation vector and the fluctuation degree of the ground as the judging factors to achieve fast rendering of large-scale terrain, applying the rule that the layers of the adjacent terrain being not more than one, to solve the crack problem that often appears in the rendering scene, to realize the function of the real-time dynamic 3D visualization of large-scale terrain scene of 3D GIS. The experimental results show that, the method accelerating terrain loading through coordination of CPU and GPU, making the process of terrain rendering have good real-time and stable frame rate.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126013198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
According to the energy yield of wind turbines, a new design method for optimizing wind turbine blades based on the aerodynamics is presented. The design object is the minimum cost of energy which is calculated from the Annual Energy Production (AEP) and the cost of the rotor. The design variables used in the current study are the chord and twist angle. The blade shape parameters and the loads of the blades are considered as the constraints. With the model in this paper, one 2 MW wind turbine rotor is designed. The aerodynamic characteristics of the designed rotor are simulated and plotted. To prove the reliability of the results, the comparison between the designed 2 MW rotor and one existing widely used 2 MW rotor is completed. The rated wind speed is reduced from the 15m/s to 12.8 m/s that displays the designed rotor has high power at the low wind speed. The maximum power coefficient is increased from 0.463 to 0.49 that can effectively improve the annual power generation.
{"title":"Shape Design and Aerodynamic Characteristics of Wind Turbine Blades Based on Energy Cost","authors":"W. Xudong, Xia Hongjun","doi":"10.1109/ICMTMA.2015.237","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.237","url":null,"abstract":"According to the energy yield of wind turbines, a new design method for optimizing wind turbine blades based on the aerodynamics is presented. The design object is the minimum cost of energy which is calculated from the Annual Energy Production (AEP) and the cost of the rotor. The design variables used in the current study are the chord and twist angle. The blade shape parameters and the loads of the blades are considered as the constraints. With the model in this paper, one 2 MW wind turbine rotor is designed. The aerodynamic characteristics of the designed rotor are simulated and plotted. To prove the reliability of the results, the comparison between the designed 2 MW rotor and one existing widely used 2 MW rotor is completed. The rated wind speed is reduced from the 15m/s to 12.8 m/s that displays the designed rotor has high power at the low wind speed. The maximum power coefficient is increased from 0.463 to 0.49 that can effectively improve the annual power generation.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124043411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to improve the ability to get rid of partial extreme spot and the diversity of population in evolution, the immunity mechanism of IA algorithm is imported into PSO algorithm to form IA-PSO algorithm. For the purpose of raising fault rate and shortening test pattern generation time, CA algorithm is imported into IA-PSO algorithm to form CAIA-PSO algorithm. Finally, adopting single stuck-at fault and using different algorithms to the simulation experiment of test pattern generation for digital integrated circuits, the result of the experiment is that CA-IA-PSO algorithm can solve the problem of test pattern generation more practically and efficiently, especially the bigger digital integrated circuits.
{"title":"The Test Pattern Generation for Digital Integrated Circuits Based on CA-IA-PSO Algorithm","authors":"Zhang Jiali, Zhang Lin, Yang Yun, Niu Tian-lin, Zhang Long, X. Xiaodong","doi":"10.1109/ICMTMA.2015.322","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.322","url":null,"abstract":"In order to improve the ability to get rid of partial extreme spot and the diversity of population in evolution, the immunity mechanism of IA algorithm is imported into PSO algorithm to form IA-PSO algorithm. For the purpose of raising fault rate and shortening test pattern generation time, CA algorithm is imported into IA-PSO algorithm to form CAIA-PSO algorithm. Finally, adopting single stuck-at fault and using different algorithms to the simulation experiment of test pattern generation for digital integrated circuits, the result of the experiment is that CA-IA-PSO algorithm can solve the problem of test pattern generation more practically and efficiently, especially the bigger digital integrated circuits.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces in detail the realization principle and detection module, anomaly detection technology based on wavelet transform, the experimental results show that it is a effective method to detect traffic anomaly. But also can distinguish normal burst traffic and attack traffic, which improves the accuracy of alarm. But this method lower time complexity is also suitable for large flow of data processing.
{"title":"Wavelet Traffic Detection Based on Variance","authors":"Zhang Yi, Mei Ting","doi":"10.1109/ICMTMA.2015.348","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.348","url":null,"abstract":"This paper introduces in detail the realization principle and detection module, anomaly detection technology based on wavelet transform, the experimental results show that it is a effective method to detect traffic anomaly. But also can distinguish normal burst traffic and attack traffic, which improves the accuracy of alarm. But this method lower time complexity is also suitable for large flow of data processing.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127403063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a hybrid genetic algorithm to solve the make-up examination arrangement problem. The objective of make-up examination arrangement to minimize the number of classrooms is analyzed, and a greedy algorithm and an original mutation operator are devised to achieve this goal. This new operator, combined with a crossover and a local search operator which are used to minimize the number of timeslots, leads to a very powerful genetic algorithm. Experiment shows that the solutions of this hybrid genetic algorithm are of excellent quality, providing a theoretical foundation for the practical application.
{"title":"A Hybrid Genetic Algorithm for Make-Up Examination Arrangement","authors":"Sun Xuecheng","doi":"10.1109/ICMTMA.2015.11","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.11","url":null,"abstract":"This paper presents a hybrid genetic algorithm to solve the make-up examination arrangement problem. The objective of make-up examination arrangement to minimize the number of classrooms is analyzed, and a greedy algorithm and an original mutation operator are devised to achieve this goal. This new operator, combined with a crossover and a local search operator which are used to minimize the number of timeslots, leads to a very powerful genetic algorithm. Experiment shows that the solutions of this hybrid genetic algorithm are of excellent quality, providing a theoretical foundation for the practical application.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132633154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the wireless sensor network monitoring activities, the sensor node location information is very important. To achieve node location information localization algorithm is adopted to estimate the better method. This article will mainly study the wireless sensor network localization algorithm based on multidimensional scaling, is proposed based on the Hop - Euclidean MDS - MAP (D) localization algorithm. It is not only improve the location accuracy, and it is conducive to the expansion of the network.
{"title":"Wireless Sensor Network Locating Algorithm Based on Multi-dimensional Scaling Study","authors":"Guo Li, L. Lai","doi":"10.1109/ICMTMA.2015.342","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.342","url":null,"abstract":"In the wireless sensor network monitoring activities, the sensor node location information is very important. To achieve node location information localization algorithm is adopted to estimate the better method. This article will mainly study the wireless sensor network localization algorithm based on multidimensional scaling, is proposed based on the Hop - Euclidean MDS - MAP (D) localization algorithm. It is not only improve the location accuracy, and it is conducive to the expansion of the network.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116561576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image restoration is an important research field of image processing. The purpose of image restoration is to improve the observed visual effect of image to make it close to the original image. This paper proposes an image restoration algorithm of smoothness constraints constructed by adaptive fuzzy edge evaluation function. First, image degradation/restoration model is introduced, based on the degradation function to solve the ill-posed problem of image restoration. Then, with the process of iteration, more image details can be detected, while the algorithm adaptively produces a more reasonable smoothness constraints. This algorithm can base on restricted adaptive image restoration algorithm, by increasing the sophistication of weight to improve the recovery of adaptive control capabilities. Finally, an experiment can be conducted to prove the effectiveness and feasibility of the image restoration algorithm proposed in this paper.
{"title":"Image Restoration Algorithm of Smoothness Constraints Constructed by Adaptive Fuzzy Edge Evaluation Function","authors":"Shi Ping","doi":"10.1109/ICMTMA.2015.345","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.345","url":null,"abstract":"Image restoration is an important research field of image processing. The purpose of image restoration is to improve the observed visual effect of image to make it close to the original image. This paper proposes an image restoration algorithm of smoothness constraints constructed by adaptive fuzzy edge evaluation function. First, image degradation/restoration model is introduced, based on the degradation function to solve the ill-posed problem of image restoration. Then, with the process of iteration, more image details can be detected, while the algorithm adaptively produces a more reasonable smoothness constraints. This algorithm can base on restricted adaptive image restoration algorithm, by increasing the sophistication of weight to improve the recovery of adaptive control capabilities. Finally, an experiment can be conducted to prove the effectiveness and feasibility of the image restoration algorithm proposed in this paper.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131568551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The K-means clustering algorithm have played an important role in the data analysis, pattern recognition, image processing, and market research. Classical K-means algorithm randomly selected initial cluster centers, so that the clustering results unstable. In this paper, through deeply study on classical k-means algorithm, we proposed a new K - means algorithm of Clustering based on double attributes of objects. The algorithm is based on the dissimilarity degree matrix which generated by high density set to construct the Huffman tree, and then according to K value to select initial cluster centers points in the Huffman tree, using this method effectively overcomes the defects of classical K-means algorithm for clustering random selection caused the initial cluster centers result unstable defects. In this paper, the new algorithm uses two UCI data sets to validate. The results of experiment show that the new k-means algorithm can choose the initial cluster center of high quality stable, so as to get better clustering results.
{"title":"A K-Means Clustering Algorithm Based on Double Attributes of Objects","authors":"Tu Linli, D. Yanni, Chu Siyong","doi":"10.1109/ICMTMA.2015.12","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.12","url":null,"abstract":"The K-means clustering algorithm have played an important role in the data analysis, pattern recognition, image processing, and market research. Classical K-means algorithm randomly selected initial cluster centers, so that the clustering results unstable. In this paper, through deeply study on classical k-means algorithm, we proposed a new K - means algorithm of Clustering based on double attributes of objects. The algorithm is based on the dissimilarity degree matrix which generated by high density set to construct the Huffman tree, and then according to K value to select initial cluster centers points in the Huffman tree, using this method effectively overcomes the defects of classical K-means algorithm for clustering random selection caused the initial cluster centers result unstable defects. In this paper, the new algorithm uses two UCI data sets to validate. The results of experiment show that the new k-means algorithm can choose the initial cluster center of high quality stable, so as to get better clustering results.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132029958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Represented by smartphone mobile terminal equipment, mostly for using Android system, with the development of modern electronic communication technology, the Android system of image acquisition and processing technology is also in constant progress. The face recognition system based on Android system, which is representative of it greatly expand the function of the use of the Android system. Human face recognition system using the promising prospects in the field of encryption, because of its unique advantages, will be used more and more. This article will mainly introduce the Android system, face recognition system, the characteristics of the processing model and realization process, expect to further promote mobile encryption technology, to provide some reference.
{"title":"Research and Implementation of Face Recognition System Based on Android","authors":"Wang Xiang-gang","doi":"10.1109/ICMTMA.2015.200","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.200","url":null,"abstract":"Represented by smartphone mobile terminal equipment, mostly for using Android system, with the development of modern electronic communication technology, the Android system of image acquisition and processing technology is also in constant progress. The face recognition system based on Android system, which is representative of it greatly expand the function of the use of the Android system. Human face recognition system using the promising prospects in the field of encryption, because of its unique advantages, will be used more and more. This article will mainly introduce the Android system, face recognition system, the characteristics of the processing model and realization process, expect to further promote mobile encryption technology, to provide some reference.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134229220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As an important part of emergency relief supplies, supplies scheduling model for the optimization of the incident emergency rescue is the important premise, the paper introduces aid scheduling model and algorithm analysis, make corresponding model for the aid of dispatching work smoothly to provide more convenient and optimization.
{"title":"Emergency Supplies Scheduling Model","authors":"Liu Yan-yan, Wang Jian-guo, Jian-guo","doi":"10.1109/ICMTMA.2015.110","DOIUrl":"https://doi.org/10.1109/ICMTMA.2015.110","url":null,"abstract":"As an important part of emergency relief supplies, supplies scheduling model for the optimization of the incident emergency rescue is the important premise, the paper introduces aid scheduling model and algorithm analysis, make corresponding model for the aid of dispatching work smoothly to provide more convenient and optimization.","PeriodicalId":196962,"journal":{"name":"2015 Seventh International Conference on Measuring Technology and Mechatronics Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134390921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}