2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS)

19-20 Dec. 2009

Go

Filter Results

Displaying Results 1 - 25 of 105
  • [Front and back covers]

    Publication Year: 2009, Page(s):c1 - c4
    Request permission for commercial reuse | |PDF file iconPDF (1526 KB)
    Freely Available from IEEE
  • 2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS 2009) [Frontmatter]

    Publication Year: 2009, Page(s):i - v
    Request permission for commercial reuse | |PDF file iconPDF (126 KB) | HTML iconHTML
    Freely Available from IEEE
  • PEITS 2009 volume 3 content

    Publication Year: 2009, Page(s):vi - xii
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (135 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Airline network design with variable hub number

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (732 KB) | HTML iconHTML

    This paper addresses the non-strict hub-and-spoken airline network design problem in airline industry. Firstly, under the condition of the hub number not specified, an optimization model to minimize the sum of transportation cost and construct hub cost is established. Secondly, the classic algorithm can not solve the problem efficiently because the problem is NP-hard problem. An ant colony algorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reactive power optimization of power system based on interior point method and branch-bound method

    Publication Year: 2009, Page(s):5 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (832 KB) | HTML iconHTML

    This paper take predictor-corrector interior point method and branch-bound method applied in reactive power optimization. Prediction-corrector interior point method for global optimization, and branch-bound method to deal with discrete variables (transformer tap and capacitor, reactor switching group number). To the reality, this paper take minimizing loss of network as objective, through the IEEE... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on fault voltage and secondary arc current of single phase refusing-shut of the 500kV extra high voltage transmission line

    Publication Year: 2009, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1735 KB) | HTML iconHTML

    It is common knowledge that 500 kV extra high voltage and long distant transmission line join a shunt reactor and a neutral grounding via small reactor; This paper analysis systematically an possible condition of the frequency-regulating resonance over-voltage on single phase cut fault to refusing-shut of the 500 kV extra high voltage transmission line which join a shunt reactor, the system compos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual instrument design based on Gray theory long-term load forecasting

    Publication Year: 2009, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4547 KB) | HTML iconHTML

    Gray theory is one of method be used in longterm load forecasting, LabView is a graphical programming language, which provide a convenient and easy design environment, so it's normally accepted by industrial sector and research laboratory. In this paper, the improved Gray prediction model is introduced based on traditional Gray prediction model, the improved Gray through to adding parameters ß to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy evaluation on archives digitization level based on improved algorithm

    Publication Year: 2009, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (603 KB) | HTML iconHTML

    Archives digitization refers to the transforming process of traditional archives to digital archives. Digital archives can, to a greater extent, meet the public demand for accessing to the file information, improve the utilization of archives and its society status, and strengthen its function of cultural institutions. So, It has important practical significance to quantitatively research on archi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A bi-level programming model of urban land use and network design problem

    Publication Year: 2009, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1633 KB) | HTML iconHTML

    Corresponding with urban land use plan and network design is helpful for the sustainable development of the city. Beginning with the traffic distribution decided by urban land use composition and floor area ratio (FAR), the bi-level programming model of urban land use and network design problem was put forward. In this model, the problem was described as the game, which the upper showed the policy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GA -RBF model and its application in evaluation of water quality

    Publication Year: 2009, Page(s):25 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1583 KB) | HTML iconHTML

    By combining GA (Genetic Algorithm), which has the advantage of global optimization, and RBF, which has the advantage of local optimization, the calculation accuracy and convergence rate of the traditional RBF neural network are improved. So a combinational evaluation model is presented based on GA and RBF neural network. And it is applied to comprehensive analysis and evaluation of water quality,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Surface water quality prediction using ARMARBF model

    Publication Year: 2009, Page(s):29 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2007 KB) | HTML iconHTML

    In view of the defect that the gray method can only predict the tendency approximately and artificial neural network can not predict the future tendency really, a new organic gray neural network model was proposed by the advantages of ARMA and rbf neural network. The neural network was trained to get the optimal structure of neural network. According to the dynamic law of one river water quality i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GA-based neural network model for teaching evaluation

    Publication Year: 2009, Page(s):33 - 35
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (863 KB) | HTML iconHTML

    At present, with the popularization of higher education and acceleration of college students every year, colleges and universities are increasing scale. Expansion of the scale for colleges and universities on the one hand, broadens the scope for development, on the other hand it also brings many problems, including the issue of the quality of teaching which is particularly prominent. Owing to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of temperature control device underground coal mine based on AT89S52

    Publication Year: 2009, Page(s):36 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (971 KB) | HTML iconHTML

    Temperature underground coal mine is an important index, especially for mining workers underground. To monitor the temperature effectively, a temperature measurement and control system is necessary to design. Temperature value is displayed on LED screen on line. When temperature value reaches the maximum, conditioning device connected with the opening end of the relay controlled by the MCU will st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Research on improving college students' English listening comprehension of China

    Publication Year: 2009, Page(s):40 - 42
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (776 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online monitoring system design of multi-rope friction hoist load

    Publication Year: 2009, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1544 KB) | HTML iconHTML

    Mine hoist is responsible for important tasks such as upgrading coal and gangue, lowering materials, lifting personnel and equipment. With increasing of mine depth and lifting capacity, multi-rope friction hoist becomes a key lifting equipment in major coal mines of China due to its advantages of small size, low weight, great lifting capacity, safe performance, suitable for deep well, etc.. As a l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time series analysis mmethods of the groundwater level prediction

    Publication Year: 2009, Page(s):47 - 50
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (969 KB) | HTML iconHTML

    Theory and methodology provided by time series analysis is one of the tools which is used for those studies focusing on highly complicated and synthetic projects. Its technology of anticipation and evaluation is more developed than others, and its forecasting circumstance is specific, too. Many scholars have yielded a rich harvest on time series in recent years, some others have researched a new f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combination prediction model for logistics demand based on least square support vector machine

    Publication Year: 2009, Page(s):51 - 53
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1703 KB) | HTML iconHTML

    Combination prediction is an effective method to improve prediction precision for logistics demand. On the basis of least square support vector machine (LS-SVM), a combination prediction model for logistics demand is proposed. Firstly, according to the historical data of logistics demand, grey model (GM), auto regression moving average (ARMA) model and polynomial prediction model are established r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of comprehensive fuzzy evaluation in enterprise network security

    Publication Year: 2009, Page(s):54 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (765 KB) | HTML iconHTML

    Evaluating the enterprise network security becomes more and more significant and important. The enterprise network security and its characteristics are introduced and analyzed. The quality evaluation system framework of enterprise network security index is established. Fuzzy evaluation index system is put forward to consider various factors. Through case study, it is concluded that comprehensive f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of improved PCA in risks assessment technology of enterprise information security

    Publication Year: 2009, Page(s):58 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1626 KB) | HTML iconHTML

    Mankind has entered the information society, and information breeds risk everywhere. Information security risk assessment will play a crucial role, which is applied to the entire life cycle of information systems, an essential technical mean in determining information system security level and has a very wide range of applications. Improved principal component analysis (IPCFA) process is use to ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Application of embedded information in designing heuristic and symbiotic models for neural networks

    Publication Year: 2009, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1907 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rough sets and its application in evaluating security problems of E-government affairs

    Publication Year: 2009, Page(s):66 - 69
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (784 KB) | HTML iconHTML

    The security of a e-government affairs is very important for the e-government affairs. The uncertainty plays very important role in making the e-government affairs run normally. Using rough set (RS), the uncertain information is mined and much more information about the e-government affairs is understood in detail. Therefore, it is a good tool to treat the uncertain information. In the process of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Orientation codes-based template matching method on workpiece detection

    Publication Year: 2009, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1596 KB) | HTML iconHTML

    A new method for the workpiece image detection was proposed according to the characteristics of online work. The algorithm extracted orientation codes as a feature and consisted of two stages: rough matching and precision matching. Firstly, some points with the matching rate in a certain range were selected using histograms of orientation codes and rotation angles were computed roughly. In the sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The miniaturization design of microstrip interdigital bandpass filter

    Publication Year: 2009, Page(s):74 - 76
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4165 KB) | HTML iconHTML

    The L-band band-pass interdigital filter was studied, a large number of experimental data showed that bandwidth narrowed with the increasing of resonator width, and the center frequency becomes larger with the reducing of the resonator length; the bandwidth will widen when the distance between resonator was reduced. Change coupled structure, increase the effective coupling area of the microstrip l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    New arithmetic of main influence angle of stratum

    Publication Year: 2009, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2340 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Study on the rock mechanics characteristic in cracked sample

    Publication Year: 2009, Page(s):81 - 84
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3766 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.