Entity

Time filter

Source Type

Wuhan, China

Wuhan Polytechnic University is a university in Wuhan, China. It is located in the Evergreen Garden real estate development north of Hankou, near Tianhe Airport.WHPU is a multidisciplinary comprehensive university with the priority over food science and engineering, the number of full-time students is about 16,000.The university develops agricultural products processing and transformation. . Wikipedia.


In this paper, a typical correlated double sampling (CDS) complementary metal oxide semiconductor (CMOS) circuit for uncooled infrared focal plane array (IRFPA) is theoretically analyzed, the key factor of CDS CMOS integrated circuit is pointed out, and a new CDS integrated circuit which is high correlative for low-frequency noise is applied in an experimental readout chip for uncooled IRFPA. Theoretical analysis indicates that the sample transfer function of a noise source acted on by CDS processing is related to noise frequency and sampling time interval and the key factor of CDS circuit for reducing or eliminating noise in readout integrated circuit is the sampling time interval. The experimental readout chip with high noise-correlative CDS integrated circuit is fabricated to verify the theoretical analysis, which can be applied to uncooled IRFPAs. © 2010 Elsevier GmbH. All rights reserved. Source


Kui D.,Wuhan Polytechnic University
Structural Design of Tall and Special Buildings | Year: 2013

Traditional shear wall structure has small space, is not flexible, causes waste of material and has bad economic efficiency. Through complete transformation of traditional shear wall, a new structure system has been created. The research and application of short-leg shear wall structure calculation theory are based on the national codes, from which the short-leg shear wall design principles are established. Traditional shear wall structure is discussed because of the world's first short-leg shear wall structure design formation and development research. According to short-leg shear wall force characteristics, horizontal displacement is divided into destructive storey drift and harmless storey drift; the formula for calculating the destructive storey drift is obtained, using destructive storey drift angle parameters and the change of main section height to control the deformation, to control structural rigidity and to ensure that the structural design attains excellence. Copyright © 2012 John Wiley & Sons, Ltd. Copyright © 2012 John Wiley & Sons, Ltd. Source


Gao W.,Wuhan Polytechnic University
Lecture Notes in Electrical Engineering | Year: 2012

Genetic algorithm is one most used evolutionary algorithm in real practice. But when genetic algorithm is used in engineering practice, the slow convergence and poor stability are the main problems. In order to overcome these problems, one new improved hybrid genetic algorithm is proposed here. In this new algorithm, the advantages of artificial immune system and traditional genetic algorithm are combined. And the basic principles in artificial immune system are introduced to improve genetic algorithm. In this new algorithm, the creation of the initial population, the mutation operation, the selection operation, and other genetic operators are all improved. At last, through the simulation experiments of some hard-optimization functions, the proposed new algorithm shows its faster convergence and better stability than a lot of existing algorithms'. © 2012 Springer-Verlag. Source


Chen H.-M.,Wuhan Polytechnic University | Yu D.-G.,Donghua University
Journal of Materials Processing Technology | Year: 2010

An elevated temperature electrospinning process was developed for the preparation of drug-loaded polyacrylonitrile (PAN) ultrafine fibers. An additional apparatus for maintaining the electrospinning temperature at a high constant value was fitted on the syringe pump. Acyclovir (ACY)-loaded PAN fibers could be prepared from the co-dissolving dimethyl sulfoxide solutions of PAN and ACY at 80 °C. As the temperature increased, the viscosities and the surface tensions of the co-dissolving solutions decreased, whereas conductivities increased, which can account for the improved electrospinning ability of the solutions. 1H NMR analysis demonstrated that chemical integrity of ACY was maintained during the elevated temperature electrospinning process. The prepared ACY-loaded PAN ultrafine fibers had a smooth surface and uniform structure with no bead-on-a-string configurations. 94% of the fiber diameters fell within the range of 400-700 nm. The X-ray diffractograms and DSC results demonstrated that almost all the ACY was able to be distributed in the PAN fiber matrix in an amorphous status. The FTIR spectra demonstrated that PAN and ACY had sufficient compatibility due to hydrogen bonding. In vitro dissolution tests exhibited that the fibers could provide sustained drug release profiles over a time period of 16 h. The study demonstrates that an elevated temperature electrospinning process is able to broaden the processing window and enabling the preparation of new types of functional fibers with high quality. © 2010 Elsevier B.V. Source


Liu W.,Wuhan Polytechnic University
2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012 - Proceedings | Year: 2012

The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more advantage characters such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. The security problem of cloud computing is very important and it can prevent the rapid development of cloud computing. This paper introduces some cloud computing systems and analyzes cloud computing security problem and its strategy according to the cloud computing concepts and characters. The data privacy and service availability in cloud computing are the key security problem. Single security method cannot solve the cloud computing security problem and many traditional and new technologies and strategies must be used together for protecting the total cloud computing system. © 2012 IEEE. Source

Discover hidden collaborations