首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 263 毫秒
1.
The LIQUAC model is often used to predict vapor-liquid equilibria, osmotic coefficients, and mean ion activity coefficients for electrolyte systems. This paper describes a thermodynamic method to analyze solid-liquid equilibrium for electrolytes in mixed solvents solutions using the LIQUAC model. The KCI solubilities in mixed water-ethanol solutions are predicted with the LIQUAC model and its original interaction parameters. This method is also used to obtain new K^+-ethanol interaction parameters in the LIQUAC model from the solubility data. The new interaction parameters accurately predict the vapor-liquid equilibrium data of K^+ salts (including KCI, KBr, and KCOOCH3) in mixed water-ethanol solutions. The results illustrate the flexibility of the LIQUAC model which can predict not only vapor-liquid equilibrium but also solid-liquid equilibrium in mixed solvent systems.  相似文献   

2.
Facial shape transformation described by facial animation parameters (FAPs) involves the dynamic movement or deformation of eyes, brows, mouth, and lips, while detailed facial appearance concerns the facial textures such as creases, wrinkles, etc. Video-based facial animation exhibits not only facial shape transformation but also detailed appearance updates. In this paper, a novel algorithm for effectively extracting FAPs from video is proposed. Our system adopts the ICA-enforced direct appearance model (DAM) to track faces from video sequences; and then, FAPs are extracted from every frame of the video based on an extended model of Wincandidate 3.1. Facial appearance details are transformed from each frame by mapping an expression ratio image to the original image. We adopt wavelet to synthesize expressive details by combining the low-frequency signals of the original face and high-frequency signals of the expressive face from each frame of the video. Experimental results show that our proposed algorithm is suitable for reproducing realistic, expressive facial animations.  相似文献   

3.
The problem of the groundwater dynamics and water balance of a confined aquifer in the aquifer system has been solved in previous studies, whereas that in the aquitard adjacent to the confined aquifer has seldom been considered. In reality, the groundwater dynamics of the aquitard are closely related to the exploitation of groundwater resources, groundwater contamination, underground storage utilization and land subsidence. In this paper, an analytical solution is derived to describe the drawdown variation in the aquitard when the head in the adjacent confined aquifer declines by a constant value. The characteristics of groundwater dynamics and water balance of the aquitard are analyzed using a dimensionless analytical solution. There is obvious delayed behavior in the response of groundwater dynamics in the aquitard, which is characterized by the delay index t0. The delayed behavior in the response of groundwater dynamics is not only dependent on the properties of the aquitard, but also proportional to the square of the thickness of the aquitard. The law of the delayed release of water is described in terms of the ratio of the delayed release of water. A water balance equation for the aquitard is established. Three stages of the water balance and the corresponding characteristics are presented with the water balance curves of the aquitard. The analytical solution is given to analyze the flux per unit horizontal area of the aquitard. The hydrogeological parameters of the aquitard, namely the hydraulic conductivity, specific storativity and hydraulic diffusivity, are estimated according to type-curve fitting between the analytical solution and observed flux. The parameters are identified and validated in an experiment.  相似文献   

4.
Social vulnerability for public safety: A case study of Beijing, China   总被引:1,自引:0,他引:1  
Vulnerability to hazards includes not only components of a physical nature, but also those arising from social factors. In developing measures for disaster prevention or emergency response for disaster relief of big cities, an analysis of social vulnerability is very necessary but quite difficult. In order to address the problem, using Beijing as an example, we established a social vulnerability index system including 26 factors and developed an improved analytic hierarchy process (AHP) method. The weight of each factor was evaluated using the improved AHP process that obviously increased the passing rate of consistency of the experts’ questionnaire. The population, career, economy, infrastructure and social vulnerability distribution maps of Beijing were obtained. From them, it’s easy to see the characteristics of various vulnerability distributions. Through sensitivity analysis, the influencing factors of each area were listed in order of importance. The approach are useful for assessing, reducing the social vulnerability of big cities in China.  相似文献   

5.
A novel audio watermarking scheme using multiscale wavelet modulation   总被引:3,自引:0,他引:3  
A novel audio watermarking scheme to embed robust and inaudible watermarks for the purpose of copyright protection is proposed. The key innovation is to add time-frequency redundancy into watermark signals by multiscale wavelet modulation. In order to maximize the watermarking strength within perceptual constraints, the signals synthesized from different scales are masked using a frequency auditory model, respectively, and then intergrated to form the final watermark signal. The detection structure is built using the redundancy in watermark signals, and the performance is further enhanced by modeling the statistical behaviors of wavelet coefficients as generalized Gaussian distribution. The use of original audio signal is not required in watermark detection. The experimental results show that our approach can achieve not only good transparency but also satisfying robustness to common audio manipulations.  相似文献   

6.
In order to minimize the energy consumption in the discovery of the routing path, this paper introduces a novel concept of effective transmission (ET) that ensures each forwarding node is not only farther from the source node, but also nearer to the destination node with respect to its sender, An energ-aware routing protocol based on ET is proposed. It enables the energy consumption for each hop to be the least for the transmission. The simulation results show the routing protocol is effective in the performance of energy consumption comparing with some other routing protocols.  相似文献   

7.
In the carpet tufting machine,feed rollers are used to guide the yarns positively.After deducing the general Euler formula of yarn tension under positive guide of rollers,a conclusion is got that the tension of yarns at the output side of each roller tends to decrease one by one.Afterwards,a computing formula of wrap angle of yarn passing through the feed roller is deduced by application of triangle geometry method.By analyzing the effect of each parameter on the yarn tension,values of the space between rollers and the roller diameter are proposed for design reference,and relations between the yarn tension and the two key parameters,the friction coefficient of roller surface and the speed of rollers,are illustrated in detail.Consequently,a policy is drawn out to control the yarn tension.The results of this paper provide not only theory foundation for empirical settings of the operational parameters of tufting machine,but also theory support for further research on yarn tension-control methods.  相似文献   

8.
To solve the problem of the information share and services integration in population information system, we propose a multi-layer tree hierarchical architecture. The command (Web Service Call) is recursively muhicast from top layer of tree to bottom layer of tree and statistical data are gatbered from bottom layer to top layer. We implemented the architecture by using Web Services technology. In our implementation, client program is the requestor of Web Services, and all leaf nodes of the last layer are only the provider of Web Services. For those nodes of intermediate layers, every node is not only the provider of Web Services, but also the dispatcher of Web Services. We take population census as an cxample to describe the working flow of the architecture.  相似文献   

9.
In the context of workflow systems, security-relevant aspect is related to the assignment of activities to (human or automated) agents. This paper intends to cast light on the management of project-oriented workflow. A comprehensive authorization model is proposed from the perspective of project management. In this model, the concept of activity decomposition and team is introduced, which improves the security of conventional role-based access control. Furthermore, policyis provided to define the static and dynamic constraints such as Separation of Duty (SoD). Validi-ty of constraints is proposed to provide a fine-grained assignment, which improves the performance of policy management. The model is applicable not only to project-oriented workflow applications but also to other teamwork environments such as virtual enterprise.  相似文献   

10.
Through qualitative and quantitative analysis of the specimens hydroextruded, we explore the effecis of the technology parameters on the rules of the metal-flow deformation. Visioplasticity method is applied to numerical analysis of tubes(or rods). Based on the results of numerical analysis, it is noticed that there is considerable tensile strain in the inner wall of the billet near the inner side of the outlet of the die. The place and the form of fractures are discussed. In analysing some groups of specimens with variable parameters, different materials and different heat-treatment techniques are used. It should be pointed out here that rules of axisymmetric laminal flow of metallic billets hydroextruded are dependent upon the material and mechanical boundary conditions. Such flow rules have influenced not only the stress fields of the deformation zone of billet, but also the distribution of residual stresses of the tube. The optimization of the parameters is also discussed.  相似文献   

11.
根据负荷预报和交易规则制订满足电网安全运行的调度计划,在电网管理中具有重要的应用价值。针对该问题,以经济效益为目标,在机组出力及电网安全等因素的限制下,建立了一个非线性规划模型,该模型是由一系列线性表达式的绝对值构成。对模型进行求解时,通过引入一组参数,将其分解为若干个线性规划子问题,再比较这些子问题的解,得出原问题的最优解,并从理论上证明了本算法得到的解是精确最优解。结果表明,本算法在运算效率和计算精度上均优于现有的其他算法。  相似文献   

12.
为解决5G移动通信系统中移动用户计算能力不足、能量消耗多、无线资源缺乏等问题,本文构建一种基于无线携能通信(Simultaneous Wireless Information and Power Transfer, SWIPT)的多用户设备间(Device to Device, D2D)通信辅助移动边缘计算(Mobile Edge Computation, MEC)系统模型,提出一种D2D-MEC联合卸载策略。该策略以系统中请求用户总能耗最小化为目标,采用二进制卸载模式和功率分流模式对请求用户进行任务卸载和能量收集。针对能耗最小化问题为非线性混合整数规划问题,根据整数变量和实数变量将原问题解耦为功率分配和计算任务卸载两个独立子问题,并分别采用Dinkelbach方法和匈牙利算法求出两个子问题的最优解。仿真实验结果表明,本文所提策略优于传统的D2D卸载策略和MEC卸载策略,有效降低了请求用户的总能耗,提高了任务执行效率。  相似文献   

13.
阐述了在黄河流域骨干工程决策支持系统开发研究中所使用的建模方法.首先,在系统分析中,建立起系统的与或图,获得了系统中各决策问题求解序列、本原问题集合以及本原问题求解算法的集合.然后将其与广义模型化结合起来,采用零部件模型设计技术建模,这样使得系统资源(数据、模型、知识、……)达到了既是相互独立的,又可灵活地生成组合,协调运行,完成了系统所提供的决策支持功能.  相似文献   

14.
0Introduction Aswellknown,super resolutiontechniqueisverysignifi cantnotonlyforboostingtheusabilityofanimage,butalsoforreducingthecostsofproducinghardware.Thisprob lemhasnowbecomeahottopicinthefieldofinternational restoration[13].Uptonow,numerousmethodshavebeenproposedforthisissue.InRef.[4],adifferentkindofconstraintsisusedtodesignasuper resolutionalgorithm.Thismethodattempts torecognizelocalfeaturesinthelow resolutionimagesandthenenhancestheirresolutioninanappropriatemanner.Byfusinginformat…  相似文献   

15.
郑鹏远  李琴  孙忠林 《科学技术与工程》2020,20(30):12443-12451
针对由多个相互关联的微电网组成的多微电网系统,本文提出基于Barzilai-Borwein梯度法的多微电网系统递阶优化调度算法。该算法通过协调各子网多余或缺少的能量,并优化各子网发电设备以实现各微电网能量供需平衡,最小化多微电网系统整体运行成本。首先建立多微电网能量流动模型及其能量管理优化问题,进而综合预测控制的滚动优化思想和关联平衡原理,设计了多微电网系统的递阶优化调度算法。该算法将整体优化的复杂的高维整体优化问题分解为若干个相互独立的低维子问题,将原来集中的大规模计算分散到每个子系统中进行,降低对单个控制器的计算性能要求,并引入Barzilai-Borwein梯度法对子微电网之间协调,提升协调级迭代计算寻优过程的收敛速度,驱动各子网的独立优化解快速收敛至多微电网的整体优化解,以较低的计算量取得了良好的多微电网能量管理效果。最后通过数值仿真验证了本文所设计算法的有效性。  相似文献   

16.
研究了丝状材料中含单一柱状夹杂轴对称本征应变问题,将原问题分解成两个子问题,并分别求得杆中的弹性场;再利用叠加原理,获得原问题的位移场、应力场及弹性应变能。  相似文献   

17.
在局部区域三维坐标变换中,布尔萨模型的旋转参数和平移参数存在相关性,容易出现解算模型病态问题.为此提出将旋转参数和平移参数分开解算的两步解法,在去掉平移参数后采用最小二乘法估计旋转参数,再用加权整体最小二乘法估计尺度参数和平移参数.该方法既可避免解算复杂的病态整体最小二乘问题,也顾及了原系统坐标误差影响.模拟实验表明:与最小二乘法和整体最小二乘法比较,两步法提高了尺度参数和平移参数的估计精度,特别是尺度参数,外围坐标变换精度明显提高.  相似文献   

18.
弹性梁是弹力力学和工程物理中一种比较常见的数学模型,为了将此模型更准确地应用于工程领域中,在对一端固定,一端滑动支撑的弹性梁方程研究的基础上,研究了此类弹性梁方程的多解性。通过将此类边值问题转化为积分方程后,进而等价于算子的不动点问题,结合其Green函数的性质与Guo-Krasnoselskii锥拉伸与压缩不动点定理,讨论了此类弹性梁方程正解的存在性问题。在非线性项满足适当条件下建立参数的取值范围,获得了此类边值问题至少有1个正解,2个正解的存在性结果与正解的不存在性结果。结论上获得了关于此类问题至少有1个正解,2个正解及没有正解的存在的特征值区间。研究结果有助于弹性梁的稳定性分析,丰富了材料力学的相关理论。  相似文献   

19.
解水平线性互补问题的神经网络   总被引:3,自引:1,他引:3  
考虑了单调的水平线性互补问题 .基于其结构特点 ,通过引入新向量 ,提出了求解它的两个简单的神经网络模型 .严格证明了所提出的模型均是 Lyapunov稳定的 ,并且大范围渐近收敛于原问题的一个精确解 .新模型的规模均与原问题相同 ,并且不含任何参数 .数值试验表明新模型不仅可行 ,而且有效  相似文献   

20.
引进多组对策系统组内部合作对策非劣解的线性型功效系数方法,证明最优解是组内部隐含某一权重向量的合作对策的非劣解,由此得到合作对策的单目标规划问题.在组内部该问题的解不仅是非劣的,而且对于所有局中人都优于不合作时的Nash平衡策略.利用组与组之间的非劣反应集,构造求解非劣Nash策略的迭代算法.该算法在保留文献[3]优点的前提下,克服其缺点,得到的解优于文献[3]对应的解.最后,用实例验证了该算法的有效性和正确性,所得结论丰富了多组对策问题的内容.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号