Entity

Time filter

Source Type

Dalian, China

Lu R.,Liaoning Police College
2015 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems, IEEE-CYBER 2015 | Year: 2015

This paper considers the scheduling model and schedulability for single-arm cluster tools with wafer residency time constraints, and constructs a mixed integer programming model with the temporal constraints of both single-arm robot and processing module. The rationality of equivalent processing time for parallel module was theoretically proved. Based on this, the periodic wafer processing and transportation procedure for both single arm robot and processing module is analyzed. Meanwhile, the schedulability conditions for cluster tools are proved. The simulation experiments are carried out to test the model and schedulable conditions, the results reveal the validity and feasibility of the presented model. © 2015 IEEE. Source


Tao W.,Liaoning Police College
Proceedings - 2014 IEEE Workshop on Electronics, Computer and Applications, IWECA 2014 | Year: 2014

With the development of computational criminology and more powerful computers, mathematical modeling of systems representing some aspect of social crime and the analysis of the resulting numerical solutions is becoming more popular. The problems of social crime and criminal behaviour control are studied according to the system self-organization theory, and from the non-equilibrium crime system point of view. The rules of the social crimes from existence to evolution are analyzed using the theories. Based on this study, the concept of extension crime statistics is introduced, and resulted in the establishment of a fundamental frame work for the non-equilibrium crime information system. Moreover, a practicable methodology is presented. Finally, the paper concludes with a depicting systematic construction of criminal describing, and we have acquired a series of macroscopic crime math models upon criminal studies. Thereafter, this paper is valuable on theoretical aspects, and has current significance as well. © 2014 IEEE. Source


He P.,Liaoning Police College
Lecture Notes in Electrical Engineering | Year: 2010

On purpose of improving the research in interactive intelligent analysis system (IIAS) when the knowledge in hand is not sufficient, an intuition inversion learning model (IILM) based on experience and knowledge is presented. The paper introduces intuitionistic fuzzy mapping inversion (IFMI) method to the criminal investigation, and poses a skeleton of intuitionistic fuzzy reasoning. Through the relationship construction of practical crime model and on-the-spot model, it sets up a couple of mapping models intuitionistic fuzzy information acquisition. The study shows that the premise of automatic reasoning is to set up patterns of intuitionistic fuzzy relationship. The paper views that the reliability of the automatic reasoning depends on the man-computer interaction results. Simultaneously, choosing the case-cracking clue should be determined by comprehensive evaluations, and self-learning of intuition or fuzzy logical judgments are essentially needed. A simple example on how to create and apply the model is give. The presented model can be applied conveniently by selecting suitable IIAS in accordance with the give intuitive judge and computing the best decision from the rules in those IIAS. © 2010 Springer-Verlag Berlin Heidelberg. Source


He P.,Liaoning Police College
Proceedings - 2014 IEEE Workshop on Electronics, Computer and Applications, IWECA 2014 | Year: 2014

According to the previous practice of optimization, kind of method has been developed to approach the optimum from non-optimum. It is considered that the non-optimum system does not exclude the targets and the results of optimum in practice. The formation of non-optimum serves as the basis for existence of optimum in uncertainty. Besides, the various characteristics and functions of the trusted optimum system can be measured from the maximum sub-optimum. By summing the practice, this paper has also come at maximum sub-optimum principle, established the conception of trusted optimum thresholds and put forward three theorems about trusted optimum parameters. Based on trusted optimum analysis, it puts out the new approach of system optimization. Meanwhile, it discusses about the general framework of trusted optimum. © 2014 IEEE. Source


Yang L.,Liaoning Police College
Applied Mechanics and Materials | Year: 2014

Forensic DNA analysis software is dedicated with forensic DNA testing platform matching data analysis tools, which can realize the platform acquisition, pretreatment of DNA data analysis and deep processing. It realizes the automation of forensic DNA testing process, further to get rid of dependence on foreign analysis software of DNA testing technology in China. It has a good prospect of popularization and application. © 2014, Trans Tech Publications, Switzerland. Source

Discover hidden collaborations