Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Qin, Z." wg kryterium: Autor


Wyświetlanie 1-12 z 12
Tytuł:
Adaptive control of autonomous underwater vehicle based on fuzzy neural network
Autorzy:
Qin, Z.
Gu, J.
Powiązania:
https://bibliotekanauki.pl/articles/384507.pdf
Data publikacji:
2010
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
autonomous underwater vehicle
fuzzy neural network
adaptive control
stability
Opis:
This paper presents an adaptive control method based on fuzzy neural network for Autonomous Underwater Vehicle (AUV). The Fuzzy Neural Network (FNN) could build the inverse model of AUV through on-line learning algorithm, which is free of fuzzy neural network structure knowledge and prior fuzzy inference rules. The adaptive controller for AUV based on FNN is proposed, and then the stability of the resulting AUV closed-loop control system is analyzed by Lyaponov stability theory. The validity of the proposed control method has been verified through computer simulation experiments.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2010, 4, 1; 104-111
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Symmetry of Current of the Coherent State from the View of O(3) σ-Model
Autorzy:
Shi, X.
Qin, Z.
Powiązania:
https://bibliotekanauki.pl/articles/1419664.pdf
Data publikacji:
2012-07
Wydawca:
Polska Akademia Nauk. Instytut Fizyki PAN
Tematy:
03.65.-w
02.40.-k
Opis:
In this paper, we apply the reduced density trajectory, ϕ-mapping topological current theory and Ginzburg-Landau model to study the current of the coherent state. We give the new expression of the current of the coherent state. Based on this expression, the symmetry of the coherence is studied. We find that the current of the coherent state corresponds to the supercurrent of two-condensate system. The partial wave functions of the coherence carry new charges and their interaction is mediated by new U(1) gauge potential.
Źródło:
Acta Physica Polonica A; 2012, 122, 1; 31-37
0587-4246
1898-794X
Pojawia się w:
Acta Physica Polonica A
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dynamic expression profile of DNA methyltransferases in rat testis development
Autorzy:
Xu, H.X.
Qin, J.Z.
Zhang, K.Y.
Zeng, W.X.
Powiązania:
https://bibliotekanauki.pl/articles/31635.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Opis:
DNA methyltransferases (Dnmts) are unique and perform specific functions during male germ cell development. To further characterize the significance of Dnmts in the events leading to production of spermatozoa, we investigated whether the expression patterns in Dnmt1, Dnmt3a, Dnmt3b and Dnmt3l were apparent in rat testes at different time points during development. The qRT-PCR results showed that expression levels of Dnmt3a and Dnmt3l were abundant before birth and were present at the highest levels in testes tissue at 18.5 days postcoitus (dpc), and gradually decreased from day 0 postpartum (dpp) to 90 dpp. Expression of Dnmt1 and Dnmt3b reached a peak after birth (P <0.01), and then gradually reduced until adulthood. Western blotting and immunolocalization analysis of Dnmt3a and Dnmt3b further confirmed the differential expression and localization of the two proteins during rat testis development. The dynamic expression profile of Dnmts implies specific and potentially nonredundant roles for each of these enzymes in the developing rat testis.
Źródło:
Polish Journal of Veterinary Sciences; 2015, 18, 3
1505-1773
Pojawia się w:
Polish Journal of Veterinary Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Accurate gradient computations at interfaces using finite element methods
Autorzy:
Qin, F.
Wang, Z.
Ma, Z.
Li, Z.
Powiązania:
https://bibliotekanauki.pl/articles/330659.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
elliptic interface problem
gradient flux computation
IFEM
mixed FE formulation
computational tube
Opis:
New finite element methods are proposed for elliptic interface problems in one and two dimensions. The main motivation is to get not only an accurate solution, but also an accurate first order derivative at the interface (from each side). The key in 1D is to use the idea of Wheeler (1974). For 2D interface problems, the point is to introduce a small tube near the interface and propose the gradient as part of unknowns, which is similar to a mixed finite element method, but only at the interface. Thus the computational cost is just slightly higher than in the standard finite element method. We present a rigorous one dimensional analysis, which shows a second order convergence order for both the solution and the gradient in 1D. For two dimensional problems, we present numerical results and observe second order convergence for the solution, and super-convergence for the gradient at the interface.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2017, 27, 3; 527-537
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A combined method for reliability analysis of multi-state system of minor-repairable components
Łączona metoda analizy niezawodności systemu wielostanowego skła dającego się z elementów podlegających drobnej naprawie
Autorzy:
Qin, J.
Niu, Y.
Li, Z.
Powiązania:
https://bibliotekanauki.pl/articles/300969.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Polskie Naukowo-Techniczne Towarzystwo Eksploatacyjne PAN
Tematy:
multi-state system
reliability index
Markov stochastic process
universal generating function
minor repair
system wielostanowy
wskaźnik niezawodności
proces stochastyczny Markowa
uniwersalna funkcja tworząca
drobne naprawy
Opis:
This paper discusses the multi-state system (MSS) consisted of multi-state components with minor failure and minor repair. In order to obtain the reliability indices of MSS, a new combined method is suggested. This method is based on the Markov stochastic process and the universal generating function (UGF) technology. The traditional idea of modeling the MSS is to use straightforward Markov process. That is not effective enough for the MSS because the model of the system is complicated usually and the state space often arouses “dimension curse” - huge numbers of the states. We suggest it should model the multi-state components and the UGF of multi-state components can be obtained firstly. Then the MSS can be decomposed into several subsystems which only contain simple series-parallel structure. According to the physical nature of the subsystems, the UGF of those subsystems can be employed recursively. Furthermore the UGF of the entire MSS will be obtained. Therefore, the reliability indices of the MSS can be evaluated easily. The suggested method simplifies greatly the complexity of calculation and is well formulized. Two numerical examples illustrate this method.
W artykule omówiono system wielostanowy (multi-state system, MSS) składający się z elementów wielostanowych, które mogą ulegać drobnym uszkodzeniom i podlegają drobnym naprawom. Zaproponowano nową metodę łączoną, która pozwala wyznaczać wskaźniki niezawodności MSS. Metoda ta opiera się na procesie stochastycznym Markowa oraz technologii uniwersalnej funkcji tworzącej (universal generating function, UGF). Tradycyjnie do modelowania MSS wykorzystuje się sam proces Markowa. Metoda ta nie jest jednak wystarczająco skuteczna w przypadku MSS, ponieważ modele tego typu systemów są zazwyczaj skomplikowane, a przestrzeń stanów często prowadzi do tzw. "przekleństwa wielowymiarowości" – konieczności uwzględnienia ogromnej liczby stanów. Nasza metoda polega na modelowaniu elementów wielostanowych, dla których, w pierwszej kolejności wyznacza się UGF. Następnie MSS można rozłożyć na kilka podsystemów, które mają prostą strukturę szeregowo-równoległą. Charakter fizyczny tych podsystemów, pozwala na rekurencyjne stosowanie UGF dla tych podsystemów. Ponadto metoda umożliwia wyznaczenie UGF dla całego MSS, co pozwala na łatwą ocenę wskaźników niezawodności MSS. Proponowana metoda znacznie upraszcza obliczenia i jest dobrze sformalizowana. W pracy przedstawiono dwa przykłady numeryczne, które ilustrują omawianą metodę.
Źródło:
Eksploatacja i Niezawodność; 2016, 18, 1; 80-88
1507-2711
Pojawia się w:
Eksploatacja i Niezawodność
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Study on the Breakdown Mechanism of Fabrication of Micro Channels in Fused Silica Substrates with ps Laser Pulses
Autorzy:
Li, S.
Bai, Z.
Qin, S.
Powiązania:
https://bibliotekanauki.pl/articles/1400288.pdf
Data publikacji:
2013-01
Wydawca:
Polska Akademia Nauk. Instytut Fizyki PAN
Tematy:
52.50.Jm
52.40.Hf
61.80.-x
42.62.-b
Opis:
A new microchannel fabrication technology for fused silica substrate is presented. A mode-locked laser was used to fabricate straight microchannels in a fused silica substrate by laser plasma-induced plasma. The depth of the channels is up to 5 mm and there are no thermal cracks around the channel. We studied the ionization mechanism of optical breakdown formed by laser pulses and discussed the optical breakdown threshold. A mechanism is proposed to explain the formation of the microchannels and the characteristics of the microchannels are analyzed through the laser pulse characteristics.
Źródło:
Acta Physica Polonica A; 2013, 123, 1; 67-72
0587-4246
1898-794X
Pojawia się w:
Acta Physica Polonica A
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
Autorzy:
Huang, Z.
Liu, S.
Qin, B.
Chen, K.
Powiązania:
https://bibliotekanauki.pl/articles/330140.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
sender equivocable encryption
chosen ciphertext attack
cross authentication code
Opis:
Fehr et al. (2010) proposed the first sender-equivocable encryption scheme secure against chosen-ciphertext attacks (NCCCA) and proved that NC-CCA security implies security against selective opening chosen-ciphertext attacks (SO-CCA). The NC-CCA security proof of the scheme relies on security against substitution attacks of a new primitive, the “cross-authentication code”. However, the security of the cross-authentication code cannot be guaranteed when all the keys used in the code are exposed. Our key observation is that, in the NC-CCA security game, the randomness used in the generation of the challenge ciphertext is exposed to the adversary. Based on this observation, we provide a security analysis of Fehr et al.'s scheme, showing that its NC-CCA security proof is flawed. We also point out that the scheme of Fehr et al. encrypting a single-bit plaintext can be refined to achieve NC-CCA security, free of the cross-authentication code. Furthermore, we propose the notion of “strong cross-authentication code”, apply it to Fehr et al. 's scheme, and show that the new version of the latter achieves NC-CCA security for multi-bit plaintexts.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2015, 25, 2; 415-430
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Fully-phase optical image encryption in diffractive-imaging scheme with QR-code-based random illumination
Autorzy:
Wang, Z.
Zhang, Y.
Gong, Q.
Li, S.
Qin, Y.
Powiązania:
https://bibliotekanauki.pl/articles/174126.pdf
Data publikacji:
2017
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
optical encryption
diffractive imaging
fully phase
phase retrieval algorithm
Opis:
Based on a fully phase encoding and phase retrieval algorithm, a diffractive-imaging-based optical encryption scheme with random illumination is proposed. In the encryption process, a QR code image is placed in the optic path to modulate the incident light and thus generate a random illumination, which has been demonstrated to enable the proposed scheme to resist the multi-slice ptychographic phase retrieval algorithm attack. The plaintext is phase-encoded, and then encrypted by two random phase masks. The diffraction pattern in the output plane is recorded as ciphertext by a CCD camera. For decryption, an iterative phase retrieval algorithm with median filtering operation is implemented. Simulation results demonstrate the effectiveness, security, and robustness of the proposal.
Źródło:
Optica Applicata; 2017, 47, 2; 233-243
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Effects of Microwave Sintering on Properties and Microstructure of Ferromanganese Alloy Powders
Autorzy:
Lei, L.
Libo, Z.
Linqing, D.
Hongbo, Z.
Guo, C.
Jinhui, P.
Qin, G.
Powiązania:
https://bibliotekanauki.pl/articles/947519.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
microwave sintering
ferromanganese powder
densification
liquid phase
process conditions
Opis:
Microwave sintering process was employed to agglomerate ferromanganese alloy powders. The effects of sintering temperature, holding time and particle size composition on the properties and microstructure of sintering products were investigated. The results was shown that increasing sintering temperature or holding time appropriately is beneficial to increase the compressive strength and volume density. SEM and EDAX analysis shows that the liquid phase formed below the melting point in the sintering process, which leads to densification. XRD patterns indicate that the main reaction during microwave sintering is the decarbonization and carburization of iron carbide phase. The experiment demonstrate that the optimum microwave sintering process condition is 1150°C, 10 min and 50% content of the powders with the size of –75 μm.
Źródło:
Archives of Metallurgy and Materials; 2018, 63, 2; 547-553
1733-3490
Pojawia się w:
Archives of Metallurgy and Materials
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Enhancing SO2 removal efficiency by lime modified with sewage sludge in a novel integrated desulfurization process
Autorzy:
Qin, L.
Han, J.
Chen, W.
Liu, Z.
He, M.
Xing, F.
Powiązania:
https://bibliotekanauki.pl/articles/950037.pdf
Data publikacji:
2017
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
sewage sludge
steel industry
sintering process
osad ściekowy
przemysł hutniczy
proces spiekania
Opis:
In China, the sintering process annually emitted around 1.5 million t SO2, representing 70% of SO2 produced from the iron and steel industry. Lime based sorbent was modified with municipal sewage sludge (MSS) and the influence of the modification on the desulfurization efficiency was investigated in a laboratory-scale novel integrated desulfurization (NID) reactor. The properties of modified sorbent were characterized by the Brunauer–Emmett–Teller (BET) analyzer and X-ray fluorescence (XRD) analyzer. BET surface area was increased from 17.48 to 46.68 m2g–1. when the MSS/lime ratio increased from 0 to 0.08. Ca4Al8Si8O32, Ca1.5SiO3.5, Na2Si2O5 and CaSiO3 found in the modified lime benefited for the increase of the BET surface area and pore volume. The effects of sewage sludge/CaO weight ratio, calcination temperature and hydration time on the desulfurization efficiency were also studied. SO2 removal efficiency was increased from 88.7% to 97.3% after using the lime modified with sewage sludge.
Źródło:
Environment Protection Engineering; 2017, 43, 4; 17-27
0324-8828
Pojawia się w:
Environment Protection Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optical image encryption by using diffractive imaging with special constraint in the input plane
Autorzy:
Wang, Z.
Wang, H.
Yang, X.
Zhang, P.
Hou, C.
Qin, Y.
Powiązania:
https://bibliotekanauki.pl/articles/173781.pdf
Data publikacji:
2016
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
optical encryption
diffractive imaging
bilinear interpolation
Opis:
In order to simplify the optical setup and the encryption process, a diffractive-imaging-based optical encryption system using a single diffraction pattern is proposed. A predesigned binary mask is placed before the plaintext in the encryption process, and three randomly distributed phase only masks are placed in the optical path. Only one diffraction pattern needs to be recorded as ciphertext by CCD. In the decryption process, an iterative phase retrieval algorithm is applied, in which the predesigned binary mask acts as a support constraint in the input plane. After the iterative process, an interpolation operation for the zero-valued pixels is also implemented. The effectiveness and robustness of the proposal are demonstrated by numerical simulation results.
Źródło:
Optica Applicata; 2016, 46, 1; 57-69
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selection of reference genes for quantitative real-time RT-PCR on gene expression in Golden Pompano (Trachinotus ovatus)
Autorzy:
Chen, X.J.
Sun, Y.
Zhang, X.Q.
Huang, S.
Cao, Z.J.
Qin, Q.W.
Hu, W.T.
Zhou, Y.C.
Powiązania:
https://bibliotekanauki.pl/articles/2087908.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Źródło:
Polish Journal of Veterinary Sciences; 2017, 3; 583-594
1505-1773
Pojawia się w:
Polish Journal of Veterinary Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-12 z 12

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies