Time filter

Source Type

Xie W.,Loudi Vocational and Technical College | Dai Y.,Hunan University
Dianli Zidonghua Shebei/Electric Power Automation Equipment | Year: 2011

A flux modulation method is designed based on the fast on-off concept of switching power supply for current transducer. Its secondary winding is consisted of main winding and control winding. The flux in the current transducer is modulated by the switching frequency and duty-cycle of control winding, and the induced voltage of main winding is changed accordingly. Simulative and experimental results show the method efficiently reduces induced voltage, which proves that the proposed method can be applied to floating power design.


Xie D.,Hunan Institute of Humanities, Science and Technology | Xiao J.,Hunan First Normal University | Guo G.,Loudi Vocational and Technical College | Jiang T.,Hunan Institute of Humanities, Science and Technology
The Scientific World Journal | Year: 2014

Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries. © 2014 Dong Xie et al.


Li X.-L.,Loudi Vocational and Technical College | Lou G.-X.,SteelInformation Automation Center
Applied Mechanics and Materials | Year: 2014

Aiming at the deficiency of large volume and complex installation monitoring system the traditional character recognition system, this paper proposes a character recognition scheme of Android intelligent terminal based on. This paper introduces the whole structure of the system, through the analysis and Research on the character recognition process, introduces the overall design process and recognition system, character recognition system client. © (2014) Trans Tech Publications, Switzerland.


Cheng Y.,Hunan Institute of Humanities, Science and Technology | You X.,Loudi Vocational and Technical College | Xiao M.,Hunan Institute of Humanities, Science and Technology
ITME 2011 - Proceedings: 2011 IEEE International Symposium on IT in Medicine and Education | Year: 2011

DS (Diamond Search) is one of the most famous motion estimation algorithms. By analyzing the characteristics of DS, it is found that DS can be improved more efficiently. A Modified Diamond Search (MDS) algorithm is proposed in this paper. Firstly, MDS employs Small Diamond Search Pattern(SDSP) to judge if the MBD(Minimum Block Distortion) point is the initial search center. If the MBD point does not locate at the search center, Simplified Large Diamond Search Pattern(SLDSP) will be used in the next search step. If the MBD point is not within the circular area with a radius of one pixel, SLDSP will be employed continually to locate the best matching block with large motion vector until the search center become the MBD point. Finally SDSP will be adopted to refine the motion vector. Experimental results show that MDS can speed up the motion estimation process greatly under the same encoding efficiency compared to DS, especially for those video sequences with simple and slow motion vectors. © 2011 IEEE.


Guojian Z.,Loudi Vocational and Technical College
Research Journal of Applied Sciences, Engineering and Technology | Year: 2013

This design has been made the module division according to its function. It including video display, three party service (volume control) and environment parameters display warning information as well as data storage module. Furthermore, this application software uses the multithreading to realize the modulation, which including the receive thread (It receives the video and audio data as well as environment parameters data), the display thread and the warning judgment thread. This application software construction is based on the S3C6410 platform with embedded WinCE 6.0 operating systems in the VS2005 development environment to realize the system function. From the above, it can transfer the environment, the video and audio information to the rescuer and the underground base and the rescue command center instantaneously and accurately. In a word, it's helpful for command center to know underground rescue situations instantaneously and can implement command well. © Maxwell Scientific Organization, 2013.


Bao S.,Loudi Vocational and Technical College
Advanced Materials Research | Year: 2011

As the internet technology develops, the application of mobile RFID becomes more and more common. Since mobile RFID label is easier to be read and attacked by hacker, personal information of the users is leaked. Present authentication mechanisms in application are either made into RFID hardware with complex design or with weaker security protection ability. The paper proposes a new security authentication mechanism and the test result shows that the authentication mechanism may effectively prevent various attack behaviors of hack with the base of low cost so as to reach the objective of protecting personal privacy of card holder. © (2011) Trans Tech Publications, Switzerland.


Guojian Z.,Loudi Vocational and Technical College
Communications in Computer and Information Science | Year: 2011

In view of various kinds of PLC, mostly are in the bad electromagnetic environment in which electric circuit with the strong electricity and the strong electricity equipment form, thus its reliability is not high, affecting the system stable movement. From the three basic principles including suppression noise source, cut-off or weaken electromagnetic interference dissemination way and enhancement installment and system antijamming ability suppression electromagnetic interference obtaining, this article discusses the system in the electromagnetic interference production, the dissemination and the suppression measure, proposes to use the software resources to eliminate the failure detection, analyses the measures of reduced numeral quantity input perturbation through counting law and detention input method and the mold by the quantity input perturbation procedure through the restriction law, the delay filtering restriction law and the delay filtering comparison test. These methods have merits such as less investment, unceasing promotion and enhancing the reliability of system greatly, making up the insufficiency of the hardware designs to a certain extent, which are promoted to apply to PLC system. © 2011 Springer-Verlag Berlin Heidelberg.


Guojian Z.,Loudi Vocational and Technical College
Communications in Computer and Information Science | Year: 2011

The article introduces some kinds of contact less switch. It includes voltage regulator, silicon controlled rectifier, photocoupler, MOSFET and IGBT. Different structures have different switch characters The theory and character of each kind are analysed, parameters of representativechip are compared According to this, engineer can choose the right switch © 2011 Springer-Verlag Berlin Heidelberg.


Xiao Z.,Loudi Vocational and Technical College
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2012

In this paper, we set up a mathematical model to solve the problem of airport ground services. In this model, we set objective function of cost and time, and the purpose is making it minimized. Base on the analysis of scheduling characteristic, we use the multi-population co-evolutionary Memetic algorithm (MAMC) which is with the elitist strategy to realize the model. From the result we can see that our algorithm is better than the genetic algorithm in this problem and we can see that our algorithm is convergence. So we can summarize that it can be a better optimization to airport ground services problem. © 2012 SPIE.


Wu J.,Loudi Vocational and Technical College
ICCSE 2012 - Proceedings of 2012 7th International Conference on Computer Science and Education | Year: 2012

Consider the implementation of heterogeneous data integration, this paper employs virtual view to design and implement data integration model based on middleware integration. The model that supported by XML technology, refer to the SQL language, its access interface is the Web Service, it effectively resolve the heterogeneous data exchange and sharing. © 2012 IEEE.

Loading Loudi Vocational and Technical College collaborators
Loading Loudi Vocational and Technical College collaborators