• Title/Summary/Keyword: Wang Tao

Search Result 371, Processing Time 0.028 seconds

Analytical behavior of built-up square concrete-filled steel tubular columns under combined preload and axial compression

  • Wang, Jian-Tao;Wang, Fa-Cheng
    • Steel and Composite Structures
    • /
    • v.38 no.6
    • /
    • pp.617-635
    • /
    • 2021
  • This paper numerically investigated the behavior of built-up square concrete-filled steel tubular (CFST) columns under combined preload and axial compression. The finite element (FE) models of target columns were verified in terms of failure mode, axial load-deformation curve and ultimate strength. A full-range analysis on the axial load-deformation response as well as the interaction behavior was conducted to reveal the composite mechanism. The parametric study was performed to investigate the influences of material strengths and geometric sizes. Subsequently, influence of construction preload on the full-range behavior and confinement effect was investigated. Numerical results indicate that the axial load-deformation curve can be divided into four working stages where the contact pressure of curling rib arc gradually disappears as the steel tube buckles; increasing width-to-thickness (B/t) ratio can enhance the strength enhancement index (e.g., an increment of 1.88% from B/t=40 to B/t=100), though ultimate strength and ductility are decreased; stiffener length and lip inclination angle display a slight influence on strength enhancement index and ductility; construction preload can degrade the plastic deformation capacity and postpone the origin appearance of contact pressure, thus making a decrease of 14.81%~27.23% in ductility. Finally, a revised equation for determining strain εscy corresponding to ultimate strength was proposed to evaluate the plastic deformation capacity of built-up square CFST columns.

Animal Fur Recognition Algorithm Based on Feature Fusion Network

  • Liu, Peng;Lei, Tao;Xiang, Qian;Wang, Zexuan;Wang, Jiwei
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.1-10
    • /
    • 2022
  • China is a big country in animal fur industry. The total production and consumption of fur are increasing year by year. However, the recognition of fur in the fur production process still mainly relies on the visual identification of skilled workers, and the stability and consistency of products cannot be guaranteed. In response to this problem, this paper proposes a feature fusion-based animal fur recognition network on the basis of typical convolutional neural network structure, relying on rapidly developing deep learning techniques. This network superimposes texture feature - the most prominent feature of fur image - into the channel dimension of input image. The output feature map of the first layer convolution is inverted to obtain the inverted feature map and concat it into the original output feature map, then Leaky ReLU is used for activation, which makes full use of the texture information of fur image and the inverted feature information. Experimental results show that the algorithm improves the recognition accuracy by 9.08% on Fur_Recognition dataset and 6.41% on CIFAR-10 dataset. The algorithm in this paper can change the current situation that fur recognition relies on manual visual method to classify, and can lay foundation for improving the efficiency of fur production technology.

Super-Resolution Reconstruction of Humidity Fields based on Wasserstein Generative Adversarial Network with Gradient Penalty

  • Tao Li;Liang Wang;Lina Wang;Rui Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1141-1162
    • /
    • 2024
  • Humidity is an important parameter in meteorology and is closely related to weather, human health, and the environment. Due to the limitations of the number of observation stations and other factors, humidity data are often not as good as expected, so high-resolution humidity fields are of great interest and have been the object of desire in the research field and industry. This study presents a novel super-resolution algorithm for humidity fields based on the Wasserstein generative adversarial network(WGAN) framework, with the objective of enhancing the resolution of low-resolution humidity field information. WGAN is a more stable generative adversarial networks(GANs) with Wasserstein metric, and to make the training more stable and simple, the gradient cropping is replaced with gradient penalty, and the network feature representation is improved by sub-pixel convolution, residual block combined with convolutional block attention module(CBAM) and other techniques. We evaluate the proposed algorithm using ERA5 relative humidity data with an hourly resolution of 0.25°×0.25°. Experimental results demonstrate that our approach outperforms not only conventional interpolation techniques, but also the super-resolution generative adversarial network(SRGAN) algorithm.

Analysis and design of voltage doubling rectifier circuit for power supply of neutron source device towards BNCT

  • Rixin Wang;Lizhen Liang;Congguo Gong;Longyang Wang;Jun Tao
    • Nuclear Engineering and Technology
    • /
    • v.56 no.6
    • /
    • pp.2395-2403
    • /
    • 2024
  • With the rapid development of DC high voltage accelerator, higher requirements have been raised for the design of DC high voltage power supply, requiring more stable high voltage with lower output ripple. Therefore, it also puts forward higher requirements for the parameter design of the voltage doubling rectifier circuit, which is the core component of the DC high voltage power supply. In order to obtain output voltage with better performance, the effects of the working frequency, the stage capacitance and the load resistance on the output voltage of the voltage doubling rectifier circuit are studied in detail by simulation. It can be concluded that the higher the working frequency of the transformer, the larger the stage capacitance, the larger the load resistance and the better the output voltage performance in a certain range. Based on this, a 2.5 MV voltage doubling rectifier circuit driven by a 120 kHz frequency transformer is designed, developed and tested for the power supply of the neutron source device towards BNCT. Experimental results show that this voltage doubling rectifier circuit can satisfy the design requirements, laying a certain foundation for the engineering design of DC high voltage power supply of neutron source device.

A Process Algebra-Based Detection Model for Multithreaded Programs in Communication System

  • Wang, Tao;Shen, Limin;Ma, Chuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.965-983
    • /
    • 2014
  • Concurrent behaviors of multithreaded programs cannot be described effectively by automata-based models. Thus, concurrent program intrusion attempts cannot be detected. To address this problem, we proposed the process algebra-based detection model for multithreaded programs (PADMP). We generate process expressions by static binary code analysis. We then add concurrency operators to process expressions and propose a model construction algorithm based on process algebra. We also present a definition of process equivalence and behavior detection rules. Experiments demonstrate that the proposed method can accurately detect errors in multithreaded programs and has linear space-time complexity. The proposed method provides effective support for concurrent behavior modeling and detection.

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

  • Ma, Chuan;Shen, Limin;Wang, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.659-679
    • /
    • 2015
  • Distributed applications are composed of multiple nodes, which exchange information with individual nodes through message passing. Compared with traditional applications, distributed applications have more complex behavior patterns because a large number of interactions and concurrent behaviors exist among their distributed nodes. Thus, it is difficult to detect anomalous behaviors and determine the location and scope of abnormal nodes, and some attacks and misuse cannot be detected. To address this problem, we introduce a method for detecting anomalous behaviors based on process algebra. We specify the architecture of the behavior detection model and the detection algorithm. The anomalous behavior detection and analysis demonstrate that our method is a good discriminator between normal and anomalous behavior characteristics of distributed applications. Performance evaluation shows that the proposed method enhances efficiency without security degradation.

Exploratory Autopsy on Digital Payment Models

  • Wang, Tao;Kim, Chang-Su;Kim, Ki-Su
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.646-651
    • /
    • 2007
  • Secure digital payment is critical in the successful shaping of global digital business. Digital payments are increasingly being used as a substitute to traditional payments, contributing markedly to the efficiency of the economy. The focus of every digital business transaction is to minimize risks arising from transactions. It is essential to ensure the security of digital payment whether used in internal networks or over wireless Internet. This paper analyses secure digital payment methods from the viewpoint of systemic security and transaction security. According to comparative analysis of digital payment models, this paper proposes a comparative analysis framework to investigate and evaluate secure digital payment. In conclusion, the comparative analysis framework, comparison of digital payment models and mobile payment models proposes a useful academic and practical foundation to enhance the understanding of secure digital payment methods. It also provides academic background and practical guidelines for the development of secure digital payment systems.

  • PDF

Application of the Correlation Technique to Electromagnetic Ultrasonic Nondestructive Evaluation: Theoretical Study and Computer Simulation

  • Zhao, Xin;Wang, Jin-Peng;Tao, Xue-Heng
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1628-1635
    • /
    • 2006
  • A new frequency-modulated m-sequence correlation technique was described. It has. been seen that the frequency modulation scheme leads to higher signal-to-noise ratio than direct sequencing and less hardware effort than PSK modulation scheme. The operating frequency of the correlation system was deduced. The optimal frequency for the frequency-modulated m-sequence correlation system should be 1.35 times of the center frequency of the transducer. The application of this correlation technique to electromagnetic ultrasonic system was computer-simulated.

  • PDF

Expression of PGDH Correlates with Cell Growth in Both Esophageal Squamous Cell Carcinoma and Adenocarcinoma

  • Yang, Guo-Tao;Wang, Juan;Xu, Tong-Zhen;Sun, Xue-Fei;Luan, Zi-Ying
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.3
    • /
    • pp.997-1000
    • /
    • 2015
  • Esophageal cancer represents the fourth most common gastrointestinal cancer and generally confers a poor prognosis. Prostaglandin-producing cyclo-oxygenase has been implicated in the pathogenesis of esophageal cancer growth. Here we report that prostaglandin dehydrogenase, the major enzyme responsible for prostaglandin degradation, is significantly reduced in expression in esophageal cancer in comparison to normal esophageal tissue. Reconstitution of PGDH expression in esophageal cancer cells suppresses cancer cell growth, at least in part through preventing cell proliferation and promoting cell apoptosis. The tumor suppressive role of PGDH applies equally to both squamous cell carcinoma and adenocarcinoma, which enriches our understanding of the pathogenesis of esophageal cancer and may provide an important therapeutic target.