首页 > 最新文献

2012 Fourth International Conference on Computational and Information Sciences最新文献

英文 中文
Boundedness for Multilinear Commutators of theta-type Calderón-Zygmund Operator on Herz-Hardy Spaces Herz-Hardy空间上theta型Calderón-Zygmund算子的多线性换易子的有界性
R. Xie, Hailian Wang
In this paper, the boundedness for the multilinear commutators generated by θ-type Calderon-Zygmund operator with Lipschitz function is discussed, and we conclude that it is bounded on Herz-Hardy spaces.
讨论了带Lipschitz函数的θ型Calderon-Zygmund算子生成的多线性换向子的有界性,并得出了它在Herz-Hardy空间上有界的结论。
{"title":"Boundedness for Multilinear Commutators of theta-type Calderón-Zygmund Operator on Herz-Hardy Spaces","authors":"R. Xie, Hailian Wang","doi":"10.1109/ICCIS.2012.96","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.96","url":null,"abstract":"In this paper, the boundedness for the multilinear commutators generated by θ-type Calderon-Zygmund operator with Lipschitz function is discussed, and we conclude that it is bounded on Herz-Hardy spaces.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128484168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Research and Implementation of the Linux Process Real-Time Monitoring Technology Linux进程实时监控技术的研究与实现
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.342
Wu Kehi, Ge Yueguang, Chen Wei, Zhang Tong
With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer viruses and Trojans become the most important factor of the hazards of computer security. This article proposes the security defense technology based on the Linux process real-time monitoring to prevent malicious processes running from the operating system kernel level. By preventing unauthorized programs and drivers to run, we can effectively prevent the Trojan horse and virus such as machine dog, and avoid being attacked maliciously. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on the Linux process real-time monitoring.
随着信息技术的飞速发展,计算机在我们的生活中变得越来越重要。特别是由于网络的普及,使得我们的工作、学习、娱乐甚至消费都越来越依赖于计算机。然而,计算机在给我们带来很多便利的同时,也使我们面临着各种各样的安全隐患。计算机病毒和木马成为危害计算机安全的最重要因素。本文提出了一种基于Linux进程实时监控的安全防御技术,防止恶意进程从操作系统内核层面运行。通过防止未经授权的程序和驱动程序运行,可以有效防止木马和机器狗等病毒,避免受到恶意攻击。本文介绍了基于Linux进程实时监控的安全防御技术的原理、理论模型和实现中的技术。
{"title":"The Research and Implementation of the Linux Process Real-Time Monitoring Technology","authors":"Wu Kehi, Ge Yueguang, Chen Wei, Zhang Tong","doi":"10.1109/ICCIS.2012.342","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.342","url":null,"abstract":"With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer viruses and Trojans become the most important factor of the hazards of computer security. This article proposes the security defense technology based on the Linux process real-time monitoring to prevent malicious processes running from the operating system kernel level. By preventing unauthorized programs and drivers to run, we can effectively prevent the Trojan horse and virus such as machine dog, and avoid being attacked maliciously. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on the Linux process real-time monitoring.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep Web Data Source Classification Based on Query Interface Context 基于查询接口上下文的深度网络数据源分类
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.117
Zilu Cui, Yuchen Fu
As the volume of information in the Deep Web grows, a Deep Web data source classification algorithm based on query interface context is presented. Two methods are combined to get the search interface similarity. One is based on the vector space. The classical TF-IDF statistics are used to gain the similarity between search interfaces. The other is to compute the two pages semantic similarity by the use of HowNet. Based on the K-NN algorithm, a WDB classification algorithm is presented. Experimental results show this algorithm generates high-quality clusters, measured both in terms of entropy and F-measure. It indicates the practical value of application.
随着深度网络信息量的增长,提出了一种基于查询接口上下文的深度网络数据源分类算法。将两种方法相结合,得到搜索界面相似度。一个是基于向量空间的。经典TF-IDF统计数据用于获得搜索界面之间的相似度。另一种是利用HowNet计算两个页面的语义相似度。在K-NN算法的基础上,提出了一种WDB分类算法。实验结果表明,该算法生成了高质量的聚类,并对熵和F-measure进行了测量。说明了该方法的实际应用价值。
{"title":"Deep Web Data Source Classification Based on Query Interface Context","authors":"Zilu Cui, Yuchen Fu","doi":"10.1109/ICCIS.2012.117","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.117","url":null,"abstract":"As the volume of information in the Deep Web grows, a Deep Web data source classification algorithm based on query interface context is presented. Two methods are combined to get the search interface similarity. One is based on the vector space. The classical TF-IDF statistics are used to gain the similarity between search interfaces. The other is to compute the two pages semantic similarity by the use of HowNet. Based on the K-NN algorithm, a WDB classification algorithm is presented. Experimental results show this algorithm generates high-quality clusters, measured both in terms of entropy and F-measure. It indicates the practical value of application.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124655221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Design and Development of the Basketball Course CAI Based on Web 基于Web的篮球课程CAI的设计与开发
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.324
Qinghua Fang, Yukuo Wang
In order to solve the problems such as low teaching efficiency and backward teaching method of basketball course in higher vocational colleges, and realize the interworking and sharing of basketball course teaching recourses, a basketball course CAI teaching platform based on Web is designed. The design of this platform, combining subject characteristics of basketball course, uses Windows NT 4/2000Server as operating system platform, Microsoft SQL Server 7.0 as RDBMS, NAS for data storage and flow technology for video service. The basketball course CAI teaching platform based on Web Service can realize the dynamic integration of basketball course teaching resources and it has good integration, openness and encapsulation. The design scheme of basketball course CAI teaching platform based on Web Service can effectively solve and help the interconnection, interworking of basketball course PE teaching resources and adapt to the informatization development demands of PE teaching.
为解决高职院校篮球课程教学效率低、教学方法落后等问题,实现篮球课程教学资源的互通与共享,设计了基于Web的篮球课程CAI教学平台。本平台的设计结合篮球课程的学科特点,采用Windows NT 4/2000Server作为操作系统平台,Microsoft SQL Server 7.0作为RDBMS, NAS作为数据存储,流技术作为视频服务。基于Web Service的篮球课程CAI教学平台可以实现篮球课程教学资源的动态整合,具有良好的整合性、开放性和封装性。基于Web Service的篮球课程CAI教学平台设计方案可以有效地解决和帮助篮球课程体育教学资源的互联互通,适应体育教学信息化发展的需求。
{"title":"The Design and Development of the Basketball Course CAI Based on Web","authors":"Qinghua Fang, Yukuo Wang","doi":"10.1109/ICCIS.2012.324","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.324","url":null,"abstract":"In order to solve the problems such as low teaching efficiency and backward teaching method of basketball course in higher vocational colleges, and realize the interworking and sharing of basketball course teaching recourses, a basketball course CAI teaching platform based on Web is designed. The design of this platform, combining subject characteristics of basketball course, uses Windows NT 4/2000Server as operating system platform, Microsoft SQL Server 7.0 as RDBMS, NAS for data storage and flow technology for video service. The basketball course CAI teaching platform based on Web Service can realize the dynamic integration of basketball course teaching resources and it has good integration, openness and encapsulation. The design scheme of basketball course CAI teaching platform based on Web Service can effectively solve and help the interconnection, interworking of basketball course PE teaching resources and adapt to the informatization development demands of PE teaching.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124668492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on the Sensitivity of the Influence Factors for the Technology Transfer Price 技术转让价格影响因素的敏感性研究
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.304
Zeng Yanlin
The special attributes of technical goods decide the complexity of the transfer technology price. To be more scientific and rational to assess the technology transfer price, the technical transfer pricing must take into account the sensitivity of the price's influence factors. The paper uses the Analytic Hierarchy Process to systematically analyze the sensitivity of influence factors, and classify the influence factors in accordance with the sensitivity level. The result shows that the sensitivity level of all influence actors restrict significantly the proportion of the price model's elements. It is reasonable to introduce the extremely sensitive factors and sensitivity factors to correct pricing model, and this is the practical needs of the technology trading subject.
技术产品的特殊属性决定了技术转让价格的复杂性。为了更加科学合理地评价技术转让价格,技术转让定价必须考虑价格影响因素的敏感性。本文采用层次分析法对影响因素的敏感性进行系统分析,并按照敏感性等级对影响因素进行分类。结果表明,各影响因素的敏感程度显著限制了价格模型要素的比例。引入极端敏感因素和敏感因素修正定价模型是合理的,这是科技交易主体的现实需要。
{"title":"Study on the Sensitivity of the Influence Factors for the Technology Transfer Price","authors":"Zeng Yanlin","doi":"10.1109/ICCIS.2012.304","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.304","url":null,"abstract":"The special attributes of technical goods decide the complexity of the transfer technology price. To be more scientific and rational to assess the technology transfer price, the technical transfer pricing must take into account the sensitivity of the price's influence factors. The paper uses the Analytic Hierarchy Process to systematically analyze the sensitivity of influence factors, and classify the influence factors in accordance with the sensitivity level. The result shows that the sensitivity level of all influence actors restrict significantly the proportion of the price model's elements. It is reasonable to introduce the extremely sensitive factors and sensitivity factors to correct pricing model, and this is the practical needs of the technology trading subject.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service Differentiation Strategy Based on Packet Loss Rate for 802.11 Wirelesses LAN 基于丢包率的802.11无线局域网业务差异化策略
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.278
Shujun Bi
With the rapid development of multimedia applications such as video on demand, VoIP, web conferencing, distant education etc. the current IEEE 802.11's Best-effect Service is unable to meet the different needs of these multimedia applications and users' request towards the quality of the network. Therefore, the research has broad prospects in improving the efficiency of the network and meeting the different needs of the users. This paper comes up with direct packet loss rate to realize service differentiation strategy, which allows high-priority node packet loss rate to be low while low priority node packet loss rate is high, beyond the condition that the total load is under control. This scheme is quite simple and easy to achieve without changing the 802.11 protocol.
随着视频点播、网络电话、网络会议、远程教育等多媒体应用的迅速发展,现有的IEEE 802.11“最佳效果服务”已不能满足这些多媒体应用的不同需求和用户对网络质量的要求。因此,本研究在提高网络效率,满足用户的不同需求方面具有广阔的前景。本文提出直接丢包率实现业务差异化策略,在总负载可控的情况下,高优先级节点丢包率低,低优先级节点丢包率高。该方案非常简单,无需更改802.11协议即可实现。
{"title":"Service Differentiation Strategy Based on Packet Loss Rate for 802.11 Wirelesses LAN","authors":"Shujun Bi","doi":"10.1109/ICCIS.2012.278","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.278","url":null,"abstract":"With the rapid development of multimedia applications such as video on demand, VoIP, web conferencing, distant education etc. the current IEEE 802.11's Best-effect Service is unable to meet the different needs of these multimedia applications and users' request towards the quality of the network. Therefore, the research has broad prospects in improving the efficiency of the network and meeting the different needs of the users. This paper comes up with direct packet loss rate to realize service differentiation strategy, which allows high-priority node packet loss rate to be low while low priority node packet loss rate is high, beyond the condition that the total load is under control. This scheme is quite simple and easy to achieve without changing the 802.11 protocol.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application and Design of the Spectral Identification System Based on Neural Network and Fuzzy Control 基于神经网络和模糊控制的光谱识别系统的应用与设计
Min Chen, Hui Liu
The spectral identification technology is a spectral basis of qualitative analysis. With the development of pattern recognition, spectral identification technology has become an important tool for rapid detection of medicine, environmental protection, petrochemical and other industries. The neural network nonlinear mapping, adaptive learning, robustness and fault tolerance features, has a wide range of applications in signal processing, knowledge engineering, pattern recognition and other fields. This paper meets the Lambert Beer law of spectral signals for the study, outlines the basic principles of neural networks for pattern recognition, and then according to the specific requirements of the spectrum recognition, multi-feature-based and neural network spectral identification programs, and conducts system design, the establishment of the basic model framework. Finally, an instance of the method is described.
光谱识别技术是定性分析的光谱基础。随着模式识别技术的发展,光谱识别技术已成为医药、环保、石化等行业快速检测的重要工具。神经网络具有非线性映射、自适应学习、鲁棒性和容错等特点,在信号处理、知识工程、模式识别等领域有着广泛的应用。本文以符合Lambert Beer定律的频谱信号为研究对象,概述了神经网络进行模式识别的基本原理,然后根据频谱识别的具体要求,提出了基于多特征和神经网络的频谱识别方案,并进行了系统设计,建立了基本的模型框架。最后,给出了该方法的一个实例。
{"title":"Application and Design of the Spectral Identification System Based on Neural Network and Fuzzy Control","authors":"Min Chen, Hui Liu","doi":"10.1109/ICCIS.2012.77","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.77","url":null,"abstract":"The spectral identification technology is a spectral basis of qualitative analysis. With the development of pattern recognition, spectral identification technology has become an important tool for rapid detection of medicine, environmental protection, petrochemical and other industries. The neural network nonlinear mapping, adaptive learning, robustness and fault tolerance features, has a wide range of applications in signal processing, knowledge engineering, pattern recognition and other fields. This paper meets the Lambert Beer law of spectral signals for the study, outlines the basic principles of neural networks for pattern recognition, and then according to the specific requirements of the spectrum recognition, multi-feature-based and neural network spectral identification programs, and conducts system design, the establishment of the basic model framework. Finally, an instance of the method is described.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Based Cluster Partition Method in Wireless Sensor Networks 无线传感器网络中基于能量的聚类划分方法
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.143
Xiao Shisong, Zou Xiangling, Zhang Feng, Feng Hui
Because the energy of the sensor nodes determines directly the wireless sensor network service life, so saving node energy which means prolonging the network life is very important. This paper proposes a new clustering method based on energy in the network with sensor nodes uniformly distributed.
由于传感器节点的能量直接决定了无线传感器网络的使用寿命,因此节省节点能量即延长网络寿命是非常重要的。提出了一种基于能量的传感器节点均匀分布网络聚类方法。
{"title":"Energy-Based Cluster Partition Method in Wireless Sensor Networks","authors":"Xiao Shisong, Zou Xiangling, Zhang Feng, Feng Hui","doi":"10.1109/ICCIS.2012.143","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.143","url":null,"abstract":"Because the energy of the sensor nodes determines directly the wireless sensor network service life, so saving node energy which means prolonging the network life is very important. This paper proposes a new clustering method based on energy in the network with sensor nodes uniformly distributed.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114623515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Image Hiding Scheme Based on 3D Skew Tent Map and Discrete Wavelet Transform 基于三维倾斜帐篷映射和离散小波变换的图像隐藏方案
Ruisong Ye, Wei Zhou, Haiying Zhao
In this paper, an image hiding scheme based on 3D skew tent map and wavelet transform is proposed. One 3D skew tent map with three control parameters and one coupled map lattice are utilized to encrypt the secret image which will be imbedded in one host image. The encryption scheme consists of generating a chaotic orbit by the skew tent map to scramble the pixel positions and yielding a random gray value sequence by the coupled map lattice to change the gray values. The encrypted secret image and the host image are transformed by the wavelet transform and then are merged in the frequency domain. Experimental results show that the proposed hiding scheme is robust against malicious attacks like cropping, noising, etc.
提出了一种基于三维斜帐篷映射和小波变换的图像隐藏方案。利用一个具有三个控制参数的三维斜帐篷映射和一个耦合映射格对秘密图像进行加密,该秘密图像将嵌入到一个主图像中。该加密方案通过斜帐篷映射生成混沌轨道打乱像素位置,通过耦合映射晶格产生随机灰度值序列改变灰度值。对加密后的秘密图像和主图像进行小波变换,然后在频域进行合并。实验结果表明,该隐藏方案对裁剪、噪声等恶意攻击具有较强的鲁棒性。
{"title":"An Image Hiding Scheme Based on 3D Skew Tent Map and Discrete Wavelet Transform","authors":"Ruisong Ye, Wei Zhou, Haiying Zhao","doi":"10.1109/ICCIS.2012.66","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.66","url":null,"abstract":"In this paper, an image hiding scheme based on 3D skew tent map and wavelet transform is proposed. One 3D skew tent map with three control parameters and one coupled map lattice are utilized to encrypt the secret image which will be imbedded in one host image. The encryption scheme consists of generating a chaotic orbit by the skew tent map to scramble the pixel positions and yielding a random gray value sequence by the coupled map lattice to change the gray values. The encrypted secret image and the host image are transformed by the wavelet transform and then are merged in the frequency domain. Experimental results show that the proposed hiding scheme is robust against malicious attacks like cropping, noising, etc.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114029002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Output Voltage Estimation for Vibration Energy Harvesters Using Relevance Vector Mechines 基于相关向量机的振动能量采集器输出电压估计
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.201
Chuan Li, Daewoong Hong, K. Kwon, Jaehwa Jeong
By converting natural vibration into electricity, vibration energy harvesters (VEHs) provide promising self-power resources to drive wireless electronic systems. The output voltage is a vital parameter to evaluate the performance of a VEH. Considering the fact that relation between the operation conditions and the output voltage is nonlinear, a relevance vector machine (RVM) -based approach is proposed to estimate the output voltage. The vibration frequency, acceleration amplitude, and load resistance are employed as the input vectors so as to model the harvested electricity voltage which is the output vector of the RVM. An experimental set-up is used to collect real data for RVM modeling and precision evaluation. The results show that the proposed method is capable of estimating the output voltage for the VEH with good precision.
通过将自然振动转化为电能,振动能量采集器(VEHs)为驱动无线电子系统提供了有前途的自供电资源。输出电压是评价电火花发生器性能的一个重要参数。考虑到工作条件与输出电压之间的非线性关系,提出了一种基于相关向量机的输出电压估计方法。采用振动频率、加速度幅值和负载电阻作为输入矢量,对收获电压进行建模,所得电压作为RVM的输出矢量。利用实验装置收集实际数据进行RVM建模和精度评估。结果表明,该方法能较好地估计出VEH的输出电压。
{"title":"Output Voltage Estimation for Vibration Energy Harvesters Using Relevance Vector Mechines","authors":"Chuan Li, Daewoong Hong, K. Kwon, Jaehwa Jeong","doi":"10.1109/ICCIS.2012.201","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.201","url":null,"abstract":"By converting natural vibration into electricity, vibration energy harvesters (VEHs) provide promising self-power resources to drive wireless electronic systems. The output voltage is a vital parameter to evaluate the performance of a VEH. Considering the fact that relation between the operation conditions and the output voltage is nonlinear, a relevance vector machine (RVM) -based approach is proposed to estimate the output voltage. The vibration frequency, acceleration amplitude, and load resistance are employed as the input vectors so as to model the harvested electricity voltage which is the output vector of the RVM. An experimental set-up is used to collect real data for RVM modeling and precision evaluation. The results show that the proposed method is capable of estimating the output voltage for the VEH with good precision.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127836605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 Fourth International Conference on Computational and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1